0)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x408}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2187.032314][T30722] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2187.046433][T30728] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2187.053675][T30728] EXT4-fs (loop0): #blocks per group too big: 32956 [ 2187.068822][T30722] EXT4-fs (loop2): bad geometry: first data block 768 is beyond end of filesystem (64) 15:34:38 executing program 1: fchownat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 15:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000bd8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:38 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x20, 0x0, 0x0) 15:34:38 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2187.230079][T30735] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2187.238335][T30730] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2187.263261][T30730] EXT4-fs (loop2): bad geometry: first data block 768 is beyond end of filesystem (64) [ 2187.319412][T30747] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2187.326531][T30747] EXT4-fs (loop0): #blocks per group too big: 32957 [ 2187.334989][T30735] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:38 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000400000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:38 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 15:34:38 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002948017bd8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:38 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00'}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/81, 0x51}, {0x0}], 0x3, 0x0, 0x0) 15:34:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x409}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:38 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2187.611218][T30768] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2187.639782][T30768] EXT4-fs (loop2): bad geometry: first data block 1024 is beyond end of filesystem (64) [ 2187.653545][T30769] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2187.661568][T30769] EXT4-fs (loop0): Invalid log cluster size: 394302466 15:34:38 executing program 1: setitimer(0x0, &(0x7f0000000000)={{}, {0x7fffffff}}, 0x0) 15:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000edc08000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:38 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2187.769391][T30779] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2187.771909][T30781] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2187.783945][T30779] EXT4-fs (loop2): bad geometry: first data block 1024 is beyond end of filesystem (64) 15:34:38 executing program 1: write(0xffffffffffffffff, &(0x7f0000000340)="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", 0xc6c0b4c2973d5737) 15:34:38 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000500000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:38 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:38 executing program 1: [ 2187.949178][T30791] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2187.957592][T30781] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:38 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2188.008655][T30791] EXT4-fs (loop0): Invalid log cluster size: 3976200194 15:34:38 executing program 1: 15:34:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x40a}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000026d18000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:39 executing program 1: [ 2188.127832][T30808] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2188.165991][T30808] EXT4-fs (loop2): bad geometry: first data block 1280 is beyond end of filesystem (64) 15:34:39 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2188.219273][T30820] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2188.224577][T30824] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2188.272592][T30820] EXT4-fs (loop0): Invalid log cluster size: 637534210 [ 2188.303484][T30822] EXT4-fs (loop2): Test dummy encryption mode enabled 15:34:39 executing program 1: [ 2188.319224][T30822] EXT4-fs (loop2): bad geometry: first data block 1280 is beyond end of filesystem (64) 15:34:39 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2188.364859][T30824] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002ffffffea8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:39 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000600000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:39 executing program 1: 15:34:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x40b}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:39 executing program 1: 15:34:39 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2188.570860][T30844] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2188.585737][T30845] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2188.601323][T30844] EXT4-fs (loop0): Invalid log cluster size: 4294967042 15:34:39 executing program 1: [ 2188.623391][T30845] EXT4-fs (loop2): bad geometry: first data block 1536 is beyond end of filesystem (64) [ 2188.669112][T30849] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:39 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:39 executing program 1: 15:34:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002ffffffef8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2188.777497][T30854] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2188.802074][T30849] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:39 executing program 1: [ 2188.819382][T30854] EXT4-fs (loop2): bad geometry: first data block 1536 is beyond end of filesystem (64) 15:34:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x40c}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:39 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:39 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000020600000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2188.937181][T30867] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2188.946154][T30867] EXT4-fs (loop0): Invalid log cluster size: 4294967042 15:34:39 executing program 1: 15:34:39 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd70", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fffffff48000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2189.078137][T30881] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2189.141749][T30880] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2189.153373][T30880] EXT4-fs (loop2): bad geometry: first data block 1538 is beyond end of filesystem (64) 15:34:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x40d}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2189.200227][T30891] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2189.200963][T30881] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:40 executing program 1: 15:34:40 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd70", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2189.245870][T30891] EXT4-fs (loop0): Invalid log cluster size: 4294967042 15:34:40 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000040600000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fffffff68000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:40 executing program 1: [ 2189.465631][T30908] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2189.467729][T30910] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2189.481010][T30910] EXT4-fs (loop2): bad geometry: first data block 1540 is beyond end of filesystem (64) 15:34:40 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd70", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2189.573411][T30908] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2189.597183][T30914] EXT4-fs (loop0): Test dummy encryption mode enabled 15:34:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x40e}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:40 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fc", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2189.634017][T30914] EXT4-fs (loop0): Invalid log cluster size: 4294967042 15:34:40 executing program 1: 15:34:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000003f78000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:40 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000700000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:40 executing program 1: [ 2189.785536][T30931] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:40 executing program 1: 15:34:40 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fc", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2189.873903][T30933] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2189.886419][T30933] EXT4-fs (loop0): Invalid log cluster size: 50331650 15:34:40 executing program 1: 15:34:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000001f88000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2189.955692][T30939] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2189.966066][T30939] EXT4-fs (loop2): bad geometry: first data block 1792 is beyond end of filesystem (64) [ 2189.967251][T30931] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:40 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fc", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:41 executing program 1: 15:34:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x40f}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2190.103696][T30948] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2190.118814][T30948] EXT4-fs (loop2): bad geometry: first data block 1792 is beyond end of filesystem (64) 15:34:41 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:41 executing program 1: 15:34:41 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000800000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2190.259379][T30957] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2190.266237][T30957] EXT4-fs (loop0): Invalid log cluster size: 16777218 [ 2190.288654][T30961] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:41 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:41 executing program 1: 15:34:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000003f88000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2190.413350][T30961] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2190.445753][T30970] EXT4-fs (loop2): Test dummy encryption mode enabled 15:34:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x410}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2190.472966][T30970] EXT4-fs (loop2): bad geometry: first data block 2048 is beyond end of filesystem (64) 15:34:41 executing program 1: 15:34:41 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2190.635162][T30985] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2190.642518][T30975] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2190.649648][T30975] EXT4-fs (loop2): bad geometry: first data block 2048 is beyond end of filesystem (64) [ 2190.661175][T30985] EXT4-fs (loop0): Invalid log cluster size: 50331650 15:34:41 executing program 1: 15:34:41 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2190.685830][T30993] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:41 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000900000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:41 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000003f98000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:41 executing program 1: [ 2190.890059][T30993] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x411}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:41 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2190.987599][T31009] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2190.997971][T31009] EXT4-fs (loop2): bad geometry: first data block 2304 is beyond end of filesystem (64) [ 2190.999353][T31010] EXT4-fs (loop0): Test dummy encryption mode enabled 15:34:41 executing program 1: 15:34:41 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, 0x0, 0x0) [ 2191.039771][T31010] EXT4-fs (loop0): Invalid log cluster size: 50331650 15:34:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fffffdf98000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2191.115863][T31020] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2191.131271][T31021] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2191.142002][T31021] EXT4-fs (loop2): bad geometry: first data block 2304 is beyond end of filesystem (64) 15:34:42 executing program 1: 15:34:42 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, 0x0, 0x0) [ 2191.195225][T31020] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x412}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:42 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000a00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2191.274988][T31038] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2191.290220][T31038] EXT4-fs (loop0): Invalid log cluster size: 4261412610 15:34:42 executing program 1: 15:34:42 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, 0x0, 0x0) 15:34:42 executing program 1: 15:34:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fffffffb8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2191.386554][T31045] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2191.386997][T31048] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2191.401845][T31045] EXT4-fs (loop2): bad geometry: first data block 2560 is beyond end of filesystem (64) 15:34:42 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:42 executing program 1: [ 2191.541689][T31054] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2191.557392][T31054] EXT4-fs (loop2): bad geometry: first data block 2560 is beyond end of filesystem (64) 15:34:42 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:42 executing program 1: [ 2191.595117][T31061] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2191.603760][T31048] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2191.612376][T31061] EXT4-fs (loop0): Invalid log cluster size: 4294967042 15:34:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x421}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:42 executing program 1: 15:34:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fffffdfd8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:42 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000020a00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:42 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:42 executing program 1: [ 2191.831882][T31078] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:42 executing program 1: [ 2191.875863][T31083] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2191.888989][T31083] EXT4-fs (loop0): Invalid log cluster size: 4261412610 [ 2191.915676][T31078] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:42 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fffffffd8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:42 executing program 1: 15:34:43 executing program 1: [ 2192.037347][T31092] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2192.052765][T31092] EXT4-fs (loop2): bad geometry: first data block 2562 is beyond end of filesystem (64) 15:34:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x422}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2192.119421][T31105] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2192.128467][T31105] EXT4-fs (loop0): Invalid log cluster size: 4294967042 15:34:43 executing program 1: 15:34:43 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2192.202055][T31104] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2192.213920][T31104] EXT4-fs (loop2): bad geometry: first data block 2562 is beyond end of filesystem (64) 15:34:43 executing program 1: 15:34:43 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000b00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2192.345432][T31112] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fffffffe8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:43 executing program 1: 15:34:43 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:43 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x0, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2192.462974][T31112] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2192.491330][T31131] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2192.502393][T31131] EXT4-fs (loop2): bad geometry: first data block 2816 is beyond end of filesystem (64) 15:34:43 executing program 1: 15:34:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x423}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2192.555409][T31125] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2192.580896][T31125] EXT4-fs (loop0): Invalid log cluster size: 4294967042 15:34:43 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x0, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:43 executing program 1: 15:34:43 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x0, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2192.620737][T31138] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2192.658357][T31138] EXT4-fs (loop2): bad geometry: first data block 2816 is beyond end of filesystem (64) 15:34:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000fff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2192.732018][T31144] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:43 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000020b00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2192.835699][T31144] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2192.860011][T31156] EXT4-fs (loop0): Test dummy encryption mode enabled 15:34:43 executing program 1: 15:34:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x424}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:43 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2192.887469][T31156] EXT4-fs (loop0): Invalid log cluster size: 251658242 [ 2192.897467][T31161] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2192.926813][T31161] EXT4-fs (loop2): bad geometry: first data block 2818 is beyond end of filesystem (64) 15:34:43 executing program 1: [ 2193.021914][T31167] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2193.044327][T31168] EXT4-fs (loop2): Test dummy encryption mode enabled 15:34:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002ffffefff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:44 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:44 executing program 1: [ 2193.079064][T31168] EXT4-fs (loop2): bad geometry: first data block 2818 is beyond end of filesystem (64) [ 2193.154400][T31167] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:44 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000c00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x425}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:44 executing program 1: [ 2193.254880][T31185] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2193.280181][T31185] EXT4-fs (loop0): Invalid log cluster size: 4026531586 15:34:44 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2193.356272][T31192] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2193.386648][T31192] EXT4-fs (loop2): bad geometry: first data block 3072 is beyond end of filesystem (64) 15:34:44 executing program 1: 15:34:44 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2193.471259][T31198] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2193.520066][T31202] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2193.529144][T31198] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:44 executing program 1: 15:34:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fffffbff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:44 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2193.560740][T31202] EXT4-fs (loop2): bad geometry: first data block 3072 is beyond end of filesystem (64) 15:34:44 executing program 1: 15:34:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x42e}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:44 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000020c00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2193.655247][T31215] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2193.665381][T31215] EXT4-fs (loop0): Invalid log cluster size: 4227858178 15:34:44 executing program 1: 15:34:44 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:44 executing program 1: [ 2193.779587][T31224] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020178fdff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:44 executing program 1: [ 2193.871340][T31224] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2193.882755][T31232] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2193.910937][T31232] EXT4-fs (loop2): bad geometry: first data block 3074 is beyond end of filesystem (64) 15:34:44 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:44 executing program 1: [ 2193.951778][T31239] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2193.975424][T31239] EXT4-fs (loop0): Invalid log cluster size: 4252500226 15:34:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x448}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020278fdff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2194.084445][T31252] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:45 executing program 1: 15:34:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x44c}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2194.176113][T31240] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2194.186043][T31240] EXT4-fs (loop2): bad geometry: first data block 3074 is beyond end of filesystem (64) 15:34:45 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000d00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:45 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:45 executing program 1: [ 2194.328270][T31260] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2194.342805][T31260] EXT4-fs (loop0): Invalid log cluster size: 4252500482 [ 2194.356324][T31259] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:45 executing program 1: 15:34:45 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020378fdff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2194.514568][T31268] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2194.523885][T31268] EXT4-fs (loop2): bad geometry: first data block 3328 is beyond end of filesystem (64) 15:34:45 executing program 1: 15:34:45 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2194.606897][T31259] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x45c}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:45 executing program 1: [ 2194.652297][T31274] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2194.661605][T31274] EXT4-fs (loop2): bad geometry: first data block 3328 is beyond end of filesystem (64) [ 2194.673497][T31288] EXT4-fs (loop0): Test dummy encryption mode enabled 15:34:45 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2194.716570][T31288] EXT4-fs (loop0): Invalid log cluster size: 4252500738 15:34:45 executing program 1: 15:34:45 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000e00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:45 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2194.837639][T31296] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020478fdff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:45 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x30, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:45 executing program 1: [ 2194.921506][T31296] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x460}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:46 executing program 1: [ 2195.039215][T31311] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2195.061484][T31311] EXT4-fs (loop2): bad geometry: first data block 3584 is beyond end of filesystem (64) 15:34:46 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x30, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:46 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000f00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:46 executing program 1: [ 2195.124120][T31316] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2195.130998][T31316] EXT4-fs (loop0): Invalid log cluster size: 4252500994 [ 2195.152504][T31328] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:46 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x30, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:46 executing program 1: 15:34:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002ffefffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:46 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x468}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2195.276762][T31328] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2195.284204][T31334] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2195.295507][T31334] EXT4-fs (loop2): bad geometry: first data block 3840 is beyond end of filesystem (64) 15:34:46 executing program 1: [ 2195.392878][T31346] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2195.395677][T31341] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2195.416306][T31346] EXT4-fs (loop0): Invalid log cluster size: 4293918466 15:34:46 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:46 executing program 1: 15:34:46 executing program 1: [ 2195.443465][T31341] EXT4-fs (loop2): bad geometry: first data block 3840 is beyond end of filesystem (64) 15:34:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fffbffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:46 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:46 executing program 1: 15:34:46 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2195.544466][T31354] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:46 executing program 1: 15:34:46 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2195.652493][T31364] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2195.661406][T31364] EXT4-fs (loop0): Invalid log cluster size: 4294704898 [ 2195.688073][T31354] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:46 executing program 1: 15:34:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x46c}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002f9fdffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2195.786500][T31366] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2195.813822][T31366] EXT4-fs (loop2): bad geometry: first data block 4096 is beyond end of filesystem (64) 15:34:46 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:46 executing program 1: 15:34:46 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000041000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2195.931072][T31390] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2195.940846][T31390] EXT4-fs (loop0): Invalid log cluster size: 4294834434 15:34:46 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:46 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000001580)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cgroup.stat\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x56a44, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[], 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) [ 2195.980072][T31391] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:46 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fdfdffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2196.075300][T31391] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2196.075316][T31403] EXT4-fs (loop2): Test dummy encryption mode enabled 15:34:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x474}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2196.118143][T31403] EXT4-fs (loop2): bad geometry: first data block 4100 is beyond end of filesystem (64) 15:34:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0xa, 0x2a77, 0xfc90009}, 0x80, 0x0}, 0x0) 15:34:47 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) [ 2196.178661][T31417] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2196.306707][T31411] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2196.315893][T31415] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2196.331091][T31417] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000027fffffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x47a}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2196.346968][T31411] EXT4-fs (loop2): bad geometry: first data block 4100 is beyond end of filesystem (64) [ 2196.359759][T31415] EXT4-fs (loop0): Invalid log cluster size: 4294835458 15:34:47 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 15:34:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000002e00)="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", 0x20003e0e}, {&(0x7f00000000c0)="88dcbd037c861cd63dd6da6e7d90be526075798863e5d1a5f90a0b4f67bc09826e27a15902e3488a78b2d193f53aec56948c88963871c6205fdc352f08a2bb385e18b0d8f7eec0ac30b57b522f261af5b3c88d5e546b9f22ab0187f9ea15db7ddfd8dff09cf5487e9bc0fa098a9e7cf6f0c9b8a283d4deee153aa44efac23295d052f0aef93ceab44b5b3a99cd7635", 0x8f}, {&(0x7f0000001e00)="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", 0xe24}], 0x3}, 0x0) 15:34:47 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001100000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:47 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 2196.508810][T31437] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2196.515705][T31437] EXT4-fs (loop0): Invalid log cluster size: 4294934274 15:34:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000028cffffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2196.625192][T31439] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:47 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 2196.721060][T31452] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2196.728147][T31439] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2196.742726][T31452] EXT4-fs (loop2): bad geometry: first data block 4352 is beyond end of filesystem (64) 15:34:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x489}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:47 executing program 5: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x341, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000001300)="362cd40e6789c962febc21d6476ab3420b82131f76f2f310c0b9f27358019c70a2db871c9d6e2e3a5588b051b0877d6333f333235dede7eb2b1ce3063bfb5d17b055e242b192cdc700edaa615796b974e3213fbc1f967adf6971c68b192d4929f52242f8e84c5401599a", &(0x7f0000000080)=""/4096}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000201031000"/20], 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a40)={&(0x7f00000011c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="020028bd7010fcdbdf250100125babec00000141000000201e0f08200017003a76e57468105f746f5f6261746164760066e7df0dc17de99dc6a3f4e2394a31a9a3a7ff1f794b587f9e6f00"/88], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001240)=ANY=[@ANYBLOB="c0000500000001002abd7000fcdb", @ANYRES32=r6, @ANYBLOB="04000000894804000500100006000000200019800500060034000000140004001e0ba7bf1ef3c293df020193cdc8702d08001d004cbf000024000e0015d800000000000005000000000000000600000000000000010002010000000005001100ea000000080025000300000008001e000000000024000e00a00000000000000001000000000000000800000000000000cb1e01020000000008001b000400000008001c00", @ANYRES32, @ANYBLOB], 0xc0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001d00)=@newlink={0x54, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 2196.792019][T31462] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2196.813717][T31462] EXT4-fs (loop0): Invalid log cluster size: 4294937602 15:34:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000297ffffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2196.944596][T31472] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2196.952134][T31471] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2196.981364][T31480] EXT4-fs (loop0): Test dummy encryption mode enabled 15:34:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000580)=""/143, 0x8f}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x4d8b90}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) [ 2196.981915][T31472] EXT4-fs (loop2): bad geometry: first data block 4352 is beyond end of filesystem (64) [ 2196.989413][T31480] EXT4-fs (loop0): Invalid log cluster size: 4294940418 15:34:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x500}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:48 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001200000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002eaffffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2197.280036][T31491] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2197.340211][T31497] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2197.356969][T31498] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2197.364351][T31491] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2197.373576][T31497] EXT4-fs (loop2): bad geometry: first data block 4608 is beyond end of filesystem (64) [ 2197.394845][T31498] EXT4-fs (loop0): Invalid log cluster size: 4294961666 15:34:48 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x2102) 15:34:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x600}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002efffffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2197.553721][T31506] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2197.570168][T31506] EXT4-fs (loop2): bad geometry: first data block 4608 is beyond end of filesystem (64) [ 2197.614028][T31515] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2197.622898][T31517] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2197.640096][T31517] EXT4-fs (loop0): Invalid log cluster size: 4294962946 [ 2197.681424][T31515] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:48 executing program 1: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8901, &(0x7f0000000000)) 15:34:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002f4ffffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:48 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001400000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x700}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000002240)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 15:34:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000002e00)="59821ac89e9a42ba0e33ed770b8ceed53d1c7374913931bdaa2cf34a3078eb02b4f14a8223af73b22ba07e926793d520d43085ff4b751230e95eabbc886e451a7ffe5a0d3999a0ef5c264afae6dff3a71345836e1befa3f08a1e7bdc60c2ad2b804342c4b252750c4f0ad1f64beba0645793e2746551439a379c0327269704d063c0c9f2313b2ac01609d7762c4fb22ee945fc71b92e4e139e4d0006fed8f3f28e78602440f321ef655f594dfa55af6db672e60dc9828ece0c5cab86ce34b6232f576e10ffead69ca900bf4ebe392fe3ee11017f011ce7b531e1fa2f9afc22c3245a7f84dda102a93aeef25228f1ffb1c32b36b39012434d50e4df225ba1242940f85c43c0756654d8f88f09ec7a2317f37678be9894fa2ec25636bb95d128ad4fe8f083688c01effc66a19db3068f292cee3d5beb2ea6d4ae029abb6f6db19f25f7d05e0d978c5aa0450fdd63caaa11744215e6549c83e9aa425ebbe65598368985a57c593368f35520bb80bf35ddf87da7f21a4d948b4c9078d5c01068e607f3377121c8627bb46075e53e13ac9954a2afd59e73388f795eb19c7012be1d7e474a84f2fef80a25fda3d4209332ff6ce9a22b4a190d743614d387de4fe92a2152b46190f6255cc28e05888bf868c785937b881a142930031f8cca5ab44a74c2e784a70920c8641e7e921814ff16dca00f359904559f03df25572c8e8aa1fc5dfe5d0785862549db3af5ab74adc7c6351940bed6e27a75acc93f38397b9738c3309c32d80ef4e127fac4ddc44f3f65c5875103b4c8e82bdb25639624c54e0f1d056cacb9a2923df0ec71ab8f81da50bca96d15dc59cef9c0b21edb0355e83d03938e0bb3809657921d98b96948d52bd653fdfa36b68af11320496aecf9aa3891eac72916c9c147b6ed0e0a3c53e689ba377836bd96db9364130c316dad59c61852fcbc0f371327eca0a8ac8250066530c3cab9a0e2a1e99444787f34e3415d80af2b67dd9d8f1ac441e6c9d3caf04e82b43529c6e23ac0935e922daf23fd382b455d6eb9563fea460df603f7a967785e08e3f561386fdb026c7e9916ecf3096a187059daf8778f693e7ea427e4390eb2d0e56ad00715f45638e57b7aa963ebf68c8850bec1b9171fac898df673ab7b27d5311b34f4f6aa1308f4f477c171028a2007d5e156ca9265ca18b6be15c4ffd2493c1f3dcce6e08dd5cb930730a60390b405b1d551bf23d1b84127c77d79ff307a0c4da3487bc419e853534f3a71837abe448063c2b87aed79c1e71df388d36580282215447096f6b987ca7aaa0485aeb207d74454223534aa22e99538576b3b5a67e310acbbfdd22ffe6493d8e83defb6684712d34a953fb5fff93f6ac03ada28a246b57228dbab3d17a7da3cb0f741ba2656f2295dee200943d0415bbc51dbda1bfbe1f1e5b948f8a96716b5c6e5c0a98cd6f45a4295d8a6409f2c48ec60f20d44ba73e86daea43cc65df4110e5b6167317661f663d7825bc17174e270e97e7215a365e7f1bd36ac77e34240e76d62ab7c3b3bfc581529a52108f48d9d1211bfba0c2b8159a9b7bcf7a640601221fe3050c1a56216c21b82814040cef7db1dd172dc9450c76bed11f17ba35eb53c2fccace45c982aa2bedec618a38ea0370bccc2f8484bed93a05010e5ac6b02a6d9d12de1c5a78160826764164b54fac12e1cc7e330134ee3e75285253f7e755bfec9661b64a6034d1a6ae968ad6803be90ecb09efe9dc45eb5891fecf2e9a35224a152b80f76badfc8ba4753fac0c56b2ebaf1e3edcdbdc1012d3ab17e9b21d4a4d7962b33f519d159f1a42cb71c1af6a88b622cb89643d7d9512675826da66d0f1e742258020331ef8a069a27e45f900f9691f8589bb7f73515897094711b9b2fdbe0cef9a4d138ca2daf6f8caab9467546a1dd73abd85b81a73e37f5e796082b81199504a210c3e835611e8b796fc5f2e39b21c9bb576cfa01fefbe9a4b9ee68a621309e4d67e718769fe8ee4edadc1161e8e1d852433dabb3d23dd915902a5812a2a44e13de525eb906cffb706bd5ef16f06aaeab880f364efb6c47f1578b7534cd9d35f037209c29794ca3b87da6d60a170964df6b1d366ebe38a21fec7e7dd46c1460b618b2d877703ddf7abd08d34cc467fc800db0984f84c2feff46741e359135371002f16b2416d0ead6065c2f0cbba7d8eef2eb0058563705a0590aac11d27400032b838cd94a65df43a78095b165299481ddae6e0631e0d6d8dca14b35ed8321b68ad80079e6cacb50c3f7764bd7c2c0de5e1a307495c524529079ef021d9537b640b102c1476a80e24889156f3c8c7e7150b400ae93552f9ad4d02c2459fc182d92dac8bb7272dd5a8e38617d498618900a9e939059e129d6bc3c888e9c24dd31676ce2ccbcc7cb7727a2ea121ece25a8bd950f5560472f0e92690540d896cdc46da392b78f3b3a3fcc755ce81162edfd5c24318da51daa59f5ad7383ef73a28e822afbfc8661c64357f74b40ccb5604e4ab803e85c1da9e12196d9002e890f7ee19018fd66cf16f9c07590e619c24986f3ea43f049564e5f32052696281f4ddc3b0d56e9c004a0085feaf65dafd112c561e10dacc53c4f8296cc22e76a74a04e61a668b65a2ca09c440b5b3c19da50cd788b053b2b6466ed2567cf0c770ab7d9b0b70cd5a14de23f483904512fd52c7b8d1a022936cad8264f58a88992948e81a3403f0648bb3a8f2be467be1cb298cf24c8ef512b07e4f9f6bd14424b422be9c8d5cb43ffe68ce21c32832a6b10cfb68de8142004b2af627f532303a82371366ba5cb7074ebc09ed3844ca061a151243067a590b278e0f42d341b7e19afaf55e5759bd075946c8535070e5b64c8c6e6cb2eddce396076576daf09ede41bc83ea1a87109b7588e14b611adc96bdc34978d17de1369aec06e8436a95e834fb380a69013bd3ded0fcb0608103e9f8cffb9fa717b142263238c87dcbe627110882a7839587de9a5b70c8a6918e64e66f5aefff9f6ed78582ce6106340ed7150ea53d0e4b01c0b153a6c4a55738ab34ff8a9c5b110620da6ed3b49f54ad7c630d857ff19f34c8e160d7fa6e4090db326166c2f124671e71f941730761a54413e6822a72541d51cf758a8f06c09eb040c218904f94a610924381c5c0b34a0bfa3c610678faa5b8b8494f7ec94c360902695c1ea6b545ec6a485956f00a8a69c79cee4fef823170390d36e2d8fb16405313fbaf37805f5b29e6a28c2be95aa7f42f92e53adfb9a9505d79ef95896d64176b7a834f4605730476956c228bb0ac385d3b0fed251e766207ebb51856038a0a23b20ce6e4ea4ed8de4e11ebac0704d0fa5d81db8dae8460479798bffb1421a81e3f56e0175e8a67a83d21c8b18d15fd2e37b22b59b9287d8a3636a47705ee4d63e17f75dbc8f52ed5ba1495aafbbd7de3d13d5f9725a746c7270eb9ba9012b34b61b9bd066aeaf4d264053faa8d8f63a390cc6b989de98a44bc8cc74825475771398c9a19d87bcd9228bb2332f911de0aeac606c3982e47d0fbf7980f5bbe5d24110ceecaeeb648155605d6476ec1f542a6ab8e12563aae34f941e55f51fa738022a729d190133b07ad6bec5583549f3acee4a4f1fe889c92c41d1fda7301b0790bebb05db3e81875a45e801bb4ff8861767ceff4c456756f11d5c6a4b2d402e2b9f2172bd11853aa5ca5cb326b15dd10ae0b180e62e991bc1ff5b386a70c5328440a8934c466d7b0c87d5efc77828e5afc1c4a861ec4014298dc001a6e010007b5585da0d29a73de9502dd523a5f572ed1d2a610b7dfed6230500cdaa623c7d6e51d012e781267a7582af8b28a9ba25a5312fbd338a3a3729e4a3c40a30036e74918aaf5f40eb220e64af1ada770274710a8542faca6ecc3c637924841ae5edc55ec86b8174ef2ed383492dcfee64aa835172db939c27ae76a03823944f441f6e1eb747f733e351c859a1d27c0b8bd74b499b59bcae186426942bff03c158f018eec3664677907936352dd509c8ba1f01da1fc429135bdd938fe6a8a5825f6016c1c35a84e03c53ebb47dec90e0ee2b9a7ffde81643a7f53a4e71f92df5955cc92df8b410b99dc6aa73646469aa2bb9aa8a365a31b76f2f3aa1325531c1a67b93aa5b5aad388a396cecb57c0b6966e3b17a27d6c1744a25f93bd58d0ec4473193bb8b7906f80ae2b742c0c13ef772e1568c0aabfa2d869ff4008261ce422a9d1b1433a5a6d904be094670bb966903e7e996462642e6198f8678ab1f79bf4d408c686742d14cb7ca6e86be28df5cf823019a583ac6f6e1629fbe1ff32efb221bc61e22d98a42e94deeca9ae0fb8b897d2b34d740268fd82f1a94cd2426f1829f7014ea39e178873bf0d8c85a9121a2069c785bfde92bf5a039afb52290ef9bfc2fcfc7ceb08d94b03df0f35c94c4d689cacea2e9be2ec48be80909720b3819f1550d1c17e94af321ccf914c92e76e8424a137c179d9983c9087b710b9585b2bb77668f1199b23fca7522a3eda42947bde362aaa89f148f7b57c85600a94c989183d2ede5e847aef0f055eefc3f6b955112443b71a79f14cce1177a2a31042af622fe1f57f267a99226caef49d9f728da5fe0bc9591e6ed2e4cc947169ca66a7e3c6e71544fea2403dfb44dcfc56e323a5db6ca72bfd023dbd06e53688b1bd96774d1ac3fbcec7156e44f4a479ce921c84df5dc5563c47a1232918ea411fff9fe0eb6e4378111b2e694caafa79b2966f4a9f557e5035045c39e69fc4d75760e676564e4dd72d95ac82383dd8511f59a1e4da2ab5a6ad73b0b50751488acd8e444a78116991da1808de58adb857d9710643af167d9c502ae1ab6f7f8178b866601300d7ac38e2d13b9fe35507bd44fa4b396972bb824f490d3595bcb486f04895e7ea6bc2e88dc687a30d4b5e7e09877331080ba04288f3ce93f614f1bf1d5c75f7e0af94b2b4466be40467be4d55dbdd5815959510f6196e334581f200b7f72bc85ba3b69cd1c205a1b01465380028a1bf9644432c89a0f1d3eb5425b930ca0c5f5e82fd06bc9b2db1e902f9160fdfd2ff37f7da66d438b665667b0188ac7873ddc809a832f68838359a24d250e14e6e39554dc261d9aa0395e3fea2867e869f25d10372931bb1bb44a5d91dca96d990f01be9faad3543bf98743770c803310603d6f7b359d53252ad5ea560f1435550f797fc23c29f5d19a21b2ae027700368079252a49514d3d9ef37f528a382d8d03798b0b64ee84cd4d69b458e16b6f4bd4825d66dc46b9a5cec34db85f0d468d542d21907b5d4d6850843946c120fa89cd402d98a44e1cb108e2532b7d92da171273fb2296e5ae0e6e39b15110698719353c106af2044e2c0c06d746c44a533d561e3062db7e5d9777237102efa019940deee64a2d7a778b00732db281c7295db209315ad7707f9694f298bb61958bf4202e12d66f0e16d5b23046b1890fb2a2e61d98162c691d97d04da1b9e9cc7993235106a82c10419e80edac0faf979923c7a92783f7f95597eb229dc61df883d50ee1aefe5c9645aa2049d18b13f5a2fc5e5619c5dffa176657bc648f670f0d3463c65db6434ddbdb6564d15a492bddf5e076d00a2e999711dc07f0ccc7004794f2675e687d3d484cf1d0463969d6058d99762eb7d0b382c5f644d7d66438f18b35d543bbad1cddda4dda60bfc459305ec4bea8065ea6fd376800db6bb603f8db481feebeb1c3f9680ca38a2d26600e3aafcc67c98fe794228567d11fb6c8d4b1bcfddb5eebb7e7d7c84cd859e387184ca58ea9ea72bcb761ca61c248", 0x100e}, {&(0x7f00000000c0)="88dcbd037c861cd63dd6da6e7d90be526075798863e5d1a5f90a0b4f67bc09826e27a15902e3488a78b2d193f53aec56948c88963871c6205fdc352f08a2bb385e18b0d8f7eec0ac30b57b522f261af5b3c88d5e546b9f22ab0187f9ea15db7ddfd8dff09cf5487e9bc0fa098a9e7cf6f0c9b8a283d4deee153aa44efac23295d052f0aef93ceab44b5b3a99cd7635", 0x8f}, {&(0x7f0000001e00)="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", 0xe24}], 0x3}, 0x0) [ 2197.857664][T31533] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2197.895836][T31533] EXT4-fs (loop0): Invalid log cluster size: 4294964226 15:34:48 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)="bd", 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001940)="93", 0x1}], 0x1}, 0x0) close(r0) [ 2197.952831][T31536] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2197.954799][T31534] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2198.013502][T31534] EXT4-fs (loop2): bad geometry: first data block 5120 is beyond end of filesystem (64) 15:34:48 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000002f000511d25a80648c63940d0124fc60100035400241db430003001327153e370100008000000000d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, 0x0, 0x800) 15:34:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002f6ffffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000a780)={0x11, 0x20000000000000f3, &(0x7f0000000400)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:34:49 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) [ 2198.055035][T31536] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x900}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:49 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) [ 2198.192136][T31559] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2198.200999][T31559] EXT4-fs (loop0): Invalid log cluster size: 4294964738 [ 2198.201245][T31545] EXT4-fs (loop2): Test dummy encryption mode enabled 15:34:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x14be41, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) [ 2198.283813][T31545] EXT4-fs (loop2): bad geometry: first data block 5120 is beyond end of filesystem (64) [ 2198.312781][T31569] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:49 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001b00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000300)='gre0\x00') 15:34:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fbffffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000002240)=""/197, 0x1a, 0xc5, 0x1}, 0x20) [ 2198.438297][T31569] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xa00}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2198.557217][T31588] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2198.622290][T31588] EXT4-fs (loop0): Invalid log cluster size: 4294966018 [ 2198.645147][T31595] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2198.662095][T31599] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0xa, 0x2a77, 0xfc90009, 0xbfff}, 0x80, 0x0}, 0x0) 15:34:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x4, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) socket$kcm(0x29, 0x7, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) perf_event_open(&(0x7f00000028c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000002940), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0xa, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) [ 2198.670415][T31595] EXT4-fs (loop2): bad geometry: first data block 6912 is beyond end of filesystem (64) 15:34:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002fdffffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8921, &(0x7f0000000300)='gre0\x00') [ 2198.808503][T31601] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2198.833736][T31601] EXT4-fs (loop2): bad geometry: first data block 6912 is beyond end of filesystem (64) 15:34:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000c40)={&(0x7f0000000240)=@nfc, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000a40)="8ae6b2ac974949151337986461", 0xd}, {&(0x7f0000000b00)}], 0x2, &(0x7f0000000c00)=[{0x18, 0x108, 0x0, "d6"}], 0x18}, 0x0) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1, 0x0, 0x0, 0x1100}, 0x6d70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 2198.901276][T31599] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xb00}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:49 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001c00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:49 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x10\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 15:34:49 executing program 5: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) [ 2199.037040][T31618] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2199.045998][T31618] EXT4-fs (loop0): Invalid log cluster size: 4294966530 15:34:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000002240)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 15:34:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@func_proto]}}, &(0x7f0000002240)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2199.148296][T31626] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002feffffff8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2199.206560][T31632] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2199.244847][T31632] EXT4-fs (loop2): bad geometry: first data block 7168 is beyond end of filesystem (64) 15:34:50 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000002240)=""/197, 0x26, 0xc5, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r0, 0x10, &(0x7f00000000c0)={&(0x7f0000000140)=""/180, 0xb4}}, 0x10) [ 2199.257659][T31626] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xc00}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:50 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000a780)={0x11, 0x10, &(0x7f0000000400)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x5f], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:34:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6000000}]}}, &(0x7f0000002240)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2199.317245][T31649] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2199.327952][T31649] EXT4-fs (loop0): Invalid log cluster size: 4294966786 15:34:50 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=""/4096, 0x1000}, 0x20c0) 15:34:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000000100000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2199.440468][T31647] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2199.444458][T31660] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2199.464081][T31647] EXT4-fs (loop2): bad geometry: first data block 7168 is beyond end of filesystem (64) 15:34:50 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001e00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2199.570770][T31669] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2199.579116][T31660] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2199.592574][T31669] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:34:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 15:34:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000001580)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x56a44, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[], 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 15:34:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xd00}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2199.639054][T31669] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 15:34:50 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)=[{0xfffffffffffffffe}], 0x1}, 0x0) [ 2199.685041][T31669] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2199.705820][T31683] EXT4-fs (loop2): Test dummy encryption mode enabled 15:34:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000c40)={&(0x7f0000000240)=@nfc={0x27, 0x0, 0x0, 0x6}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000900)="36b4f413abbd0bcec7f99952e7ba1420f1059add5cf9da43deb7e367ba75f298f133e157a3d19530d944e19e71bce9700d1f8883aafa34ee4387d83e2453b5b8c93fb34190cc54", 0x47}, {&(0x7f0000000a40)="8ae6b2ac974949151337986461268c792b514647df8652ac477392713d8d29783dd28f9400df341163", 0x29}], 0x2, &(0x7f0000000c00)=[{0x18, 0x108, 0x2, "d6"}], 0x18}, 0x4000) sendmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000480)="ff0f", 0x2}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1, 0x0, 0x0, 0x1100}, 0x6d70) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000000)={0x2, 0x3ffe, @remote}, 0x10, 0x0}, 0x24048844) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x20, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x70, 0x6, 0x7f, 0x0, 0xa9, 0x0, 0x1, 0xea068, 0xf, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x400c, 0x3, 0x0, 0x4, 0x718, 0x10000, 0x3b9e}, 0xffffffffffffffff, 0x1, r2, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) [ 2199.764206][T31683] EXT4-fs (loop2): bad geometry: first data block 7680 is beyond end of filesystem (64) [ 2199.779915][T31669] EXT4-fs error (device loop0): ext4_fill_super:4709: inode #2: comm syz-executor.0: iget: root inode unallocated [ 2199.831891][T31693] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2199.871096][T31693] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:50 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x40) [ 2199.892940][T31669] EXT4-fs (loop0): get root inode failed [ 2199.926766][T31669] EXT4-fs (loop0): mount failed 15:34:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xe00}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc4000000, 0x0, 0x0, 0x2}}, &(0x7f0000002240)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 15:34:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x14be41, 0x0) write$cgroup_subtree(r0, 0x0, 0xf0ffffff7f0000) [ 2200.086234][T31690] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2200.122932][T31690] EXT4-fs (loop2): bad geometry: first data block 7680 is beyond end of filesystem (64) 15:34:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000004000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2200.147544][T31715] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:51 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000001f00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:51 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000180)="f4", 0x1}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/13, 0xd}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000280)={r3}) [ 2200.325411][T31715] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2200.335205][T31730] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2200.337648][T31723] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2200.350003][T31730] EXT4-fs (loop2): bad geometry: first data block 7936 is beyond end of filesystem (64) 15:34:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xf00}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2200.379092][T31723] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:34:51 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000840)=ANY=[], 0xe0}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff07004000632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x102, 0x60000000, 0x0, 0xfffffffffffffe48, &(0x7f0000000000), &(0x7f00000000c0)="61ae793cb58796e98bec67538e015077de7e272f4c58590e0a49abbb02864ce87f29c55242edc400de0f90b385e2f9c937fd3b232ab7c99460628f97e6d6f935e88684d642fd966756e2d8b5af7a9002d71c203c4dd9b55ae6eb91e77d823ca1a2de2496a532933552dfb5907808176243ef5971c1a9c84ebfbd113d1a233ed5490f124afc9b88bc97d734a20b1e"}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) [ 2200.436386][T31723] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2200.453567][T31723] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2200.487316][T31723] EXT4-fs error (device loop0): ext4_fill_super:4709: inode #2: comm syz-executor.0: iget: root inode unallocated [ 2200.487472][T31737] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2200.510365][T31723] EXT4-fs (loop0): get root inode failed [ 2200.535807][T31723] EXT4-fs (loop0): mount failed [ 2200.539704][T31745] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2200.561645][T31737] EXT4-fs (loop2): bad geometry: first data block 7936 is beyond end of filesystem (64) 15:34:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000007f00000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2200.625496][T31745] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:51 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000012c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000012ac0)=ANY=[], 0x108}, 0x0) 15:34:51 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000002000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x1001}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2200.777716][T31756] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2200.807925][T31756] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:34:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x8095) 15:34:51 executing program 5: bpf$MAP_CREATE(0x400000000000000, &(0x7f0000000480)={0xe, 0x4, 0x0, 0x1000000}, 0x40) [ 2200.893002][T31756] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2200.959120][T31767] EXT4-fs (loop2): Test dummy encryption mode enabled 15:34:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x7, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {0x6}, {0x10}, {0xb, 0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000180)=""/202, 0x53, 0xca, 0x1}, 0x20) [ 2201.003974][T31770] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2201.029828][T31756] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2201.041338][T31767] EXT4-fs (loop2): bad geometry: first data block 8192 is beyond end of filesystem (64) 15:34:51 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000840)=ANY=[], 0xe0}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff07004000632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x102, 0x60000000, 0x0, 0xfffffffffffffe48, &(0x7f0000000000), &(0x7f00000000c0)="61ae793cb58796e98bec67538e015077de7e272f4c58590e0a49abbb02864ce87f29c55242edc400de0f90b385e2f9c937fd3b232ab7c99460628f97e6d6f935e88684d642fd966756e2d8b5af7a9002d71c203c4dd9b55ae6eb91e77d823ca1a2de2496a532933552dfb5907808176243ef5971c1a9c84ebfbd113d1a233ed5490f124afc9b88bc97d734a20b1e"}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 2201.074339][T31756] EXT4-fs error (device loop0): ext4_fill_super:4709: inode #2: comm syz-executor.0: iget: root inode unallocated [ 2201.093687][T31756] EXT4-fs (loop0): get root inode failed [ 2201.101497][T31756] EXT4-fs (loop0): mount failed 15:34:52 executing program 5: semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000440)) [ 2201.204087][T31775] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2201.212210][T31770] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000200008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2201.259177][T31775] EXT4-fs (loop2): bad geometry: first data block 8192 is beyond end of filesystem (64) 15:34:52 executing program 5: socket(0x0, 0x0, 0x8) 15:34:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x1100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:52 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000102000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:52 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x800) 15:34:52 executing program 1: nanosleep(&(0x7f0000000040), &(0x7f0000000080)) 15:34:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001540)={&(0x7f00000014c0)=@file={0x0, './file0\x00'}, 0xa, 0x0}, 0x0) [ 2201.451992][T31800] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2201.484509][T31800] EXT4-fs (loop0): Invalid log cluster size: 131074 [ 2201.513169][T31814] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2201.514768][T31807] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2201.540228][T31814] EXT4-fs (loop2): bad geometry: first data block 8208 is beyond end of filesystem (64) 15:34:52 executing program 5: pipe2(&(0x7f0000000000), 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x20007461, 0x0) 15:34:52 executing program 1: shmctl$SHM_UNLOCK(0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) 15:34:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000300008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:52 executing program 5: semget(0x1, 0x5, 0x0) 15:34:52 executing program 1: setrlimit(0x0, &(0x7f0000000000)={0x80000000}) [ 2201.686135][T31822] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2201.699225][T31807] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2201.709414][T31822] EXT4-fs (loop2): bad geometry: first data block 8208 is beyond end of filesystem (64) 15:34:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x1200}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x1) 15:34:52 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000002100000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:52 executing program 5: openat(0xffffffffffffffff, 0x0, 0x20, 0x0) 15:34:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) [ 2201.889306][T31834] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2201.896820][T31834] EXT4-fs (loop0): Invalid log cluster size: 196610 [ 2201.932884][T31848] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2201.944552][T31848] EXT4-fs (loop2): bad geometry: first data block 8448 is beyond end of filesystem (64) 15:34:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000400008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:52 executing program 5: semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000440)=[0x0]) 15:34:52 executing program 1: nanosleep(&(0x7f0000000040)={0xffffffff7fffffff}, 0x0) [ 2202.014054][T31855] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:52 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) [ 2202.111091][T31863] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2202.120846][T31855] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2202.124791][T31863] EXT4-fs (loop0): Invalid log cluster size: 262146 15:34:53 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000002200000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:53 executing program 5: accept$inet(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=0xc) 15:34:53 executing program 1: accept$inet(0xffffffffffffffff, &(0x7f0000000300), 0x0) 15:34:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x1813}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2202.278455][T31880] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2202.314140][T31880] EXT4-fs (loop2): bad geometry: first data block 8704 is beyond end of filesystem (64) 15:34:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000500008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:53 executing program 1: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 15:34:53 executing program 5: [ 2202.318364][T31885] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:53 executing program 5: 15:34:53 executing program 1: [ 2202.370383][T31889] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2202.385257][T31889] EXT4-fs (loop0): Invalid log cluster size: 327682 [ 2202.436620][T31891] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2202.443886][T31891] EXT4-fs (loop2): bad geometry: first data block 8704 is beyond end of filesystem (64) 15:34:53 executing program 1: 15:34:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000600008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:53 executing program 5: getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) 15:34:53 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000002500000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2202.550196][T31885] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:53 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, 0x0, 0x0, 0x0) 15:34:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x2100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2202.640600][T31910] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2202.667760][T31910] EXT4-fs (loop0): Invalid log cluster size: 393218 15:34:53 executing program 5: [ 2202.740598][T31920] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:53 executing program 1: [ 2202.794705][T31921] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2202.807873][T31921] EXT4-fs (loop2): bad geometry: first data block 9472 is beyond end of filesystem (64) 15:34:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000700008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:53 executing program 5: [ 2202.848358][T31920] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:53 executing program 1: 15:34:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x2e00}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:53 executing program 5: [ 2202.962139][T31928] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2202.974738][T31928] EXT4-fs (loop2): bad geometry: first data block 9472 is beyond end of filesystem (64) [ 2202.976300][T31935] EXT4-fs (loop0): Test dummy encryption mode enabled 15:34:53 executing program 1: 15:34:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000680)={0x64, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_TX_LPI_TIMER={0x8}, @ETHTOOL_A_EEE_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x64}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="e80100001a00010025bd7000fcdbdf25fc000000000000000000000000000001ffffffff00"/48, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="ac14140c000000000000000000000000000004d33c000000e0000001000000000000000000000000a50b000000000000090000000000000000000000000000000000000000000000ff03000000000000090000000000000006000000000000000000ffffffffffff8000000000000000030000000000000000020000000000000000000000000000e0ffffff01000000212c000025bd7000003500000a000009020000000000000010000a0025bd700027bd70000200000099"], 0x1e8}}, 0x0) [ 2203.047870][T31935] EXT4-fs (loop0): Invalid log cluster size: 458754 [ 2203.072598][T31944] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:54 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000002700000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:54 executing program 1: 15:34:54 executing program 5: 15:34:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000800008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2203.255542][T31944] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:54 executing program 5: 15:34:54 executing program 1: 15:34:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x3f00}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2203.307205][T31957] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2203.317533][T31962] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2203.324483][T31962] EXT4-fs (loop0): Invalid log cluster size: 524290 [ 2203.331779][T31957] EXT4-fs (loop2): bad geometry: first data block 9984 is beyond end of filesystem (64) 15:34:54 executing program 1: 15:34:54 executing program 5: [ 2203.503417][T31964] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2203.531525][T31964] EXT4-fs (loop2): bad geometry: first data block 9984 is beyond end of filesystem (64) [ 2203.547268][T31977] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000900008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:54 executing program 5: 15:34:54 executing program 1: 15:34:54 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000002e00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:54 executing program 1: 15:34:54 executing program 5: [ 2203.687094][T31977] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2203.694118][T31985] EXT4-fs (loop0): Test dummy encryption mode enabled 15:34:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xdb530000}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2203.746087][T31985] EXT4-fs (loop0): Invalid log cluster size: 589826 [ 2203.777678][T31993] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2203.784797][T31993] EXT4-fs (loop2): bad geometry: first data block 11776 is beyond end of filesystem (64) 15:34:54 executing program 1: 15:34:54 executing program 5: 15:34:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000a00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:54 executing program 1: 15:34:54 executing program 5: [ 2203.923167][T32003] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2203.931857][T32004] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2203.938781][T32003] EXT4-fs (loop2): bad geometry: first data block 11776 is beyond end of filesystem (64) 15:34:55 executing program 5: 15:34:55 executing program 1: 15:34:55 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000003f00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2204.055017][T32008] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2204.055628][T32004] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2204.085510][T32008] EXT4-fs (loop0): Invalid log cluster size: 655362 15:34:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xdc530000}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:55 executing program 1: 15:34:55 executing program 5: 15:34:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000b00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:55 executing program 1: [ 2204.272799][T32021] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2204.293618][T32021] EXT4-fs (loop2): bad geometry: first data block 16128 is beyond end of filesystem (64) 15:34:55 executing program 1: 15:34:55 executing program 5: [ 2204.392423][T32033] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2204.399790][T32034] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2204.408008][T32034] EXT4-fs (loop0): Invalid log cluster size: 720898 15:34:55 executing program 1: 15:34:55 executing program 5: [ 2204.561711][T32028] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2204.570584][T32033] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2204.583648][T32028] EXT4-fs (loop2): bad geometry: first data block 16128 is beyond end of filesystem (64) 15:34:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000c00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xdc570000}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:55 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000004000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:55 executing program 1: 15:34:55 executing program 5: 15:34:55 executing program 5: [ 2204.774938][T32051] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2204.796080][T32051] EXT4-fs (loop0): Invalid log cluster size: 786434 [ 2204.797426][T32060] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:55 executing program 1: [ 2204.928945][T32062] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2204.946636][T32060] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2204.962090][T32062] EXT4-fs (loop2): bad geometry: first data block 16384 is beyond end of filesystem (64) 15:34:55 executing program 5: 15:34:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000d00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xdd530000}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:55 executing program 5: 15:34:55 executing program 1: 15:34:56 executing program 5: 15:34:56 executing program 1: [ 2205.173049][T32075] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2205.182047][T32070] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2205.193452][T32070] EXT4-fs (loop2): bad geometry: first data block 16384 is beyond end of filesystem (64) [ 2205.205422][T32075] EXT4-fs (loop0): Invalid log cluster size: 851970 [ 2205.253188][T32085] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:56 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000008004000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:56 executing program 5: 15:34:56 executing program 1: 15:34:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000e00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:56 executing program 5: 15:34:56 executing program 1: [ 2205.410345][T32085] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:56 executing program 5: 15:34:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xdd570000}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2205.503687][T32099] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2205.510092][T32098] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2205.525835][T32098] EXT4-fs (loop0): Invalid log cluster size: 917506 [ 2205.534474][T32099] EXT4-fs (loop2): bad geometry: first data block 16384 is beyond end of filesystem (64) 15:34:56 executing program 1: 15:34:56 executing program 5: 15:34:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000f00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:56 executing program 1: [ 2205.705487][T32112] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2205.717847][T32109] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2205.772654][T32122] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2205.781411][T32109] EXT4-fs (loop2): bad geometry: first data block 16384 is beyond end of filesystem (64) [ 2205.785156][T32122] EXT4-fs (loop0): Invalid log cluster size: 983042 15:34:56 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000004800000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:56 executing program 5: 15:34:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xde530000}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:56 executing program 1: 15:34:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:56 executing program 1: 15:34:56 executing program 5: 15:34:57 executing program 5: [ 2206.082793][T32134] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2206.102553][T32135] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2206.113802][T32135] EXT4-fs (loop0): Invalid log cluster size: 1048578 15:34:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001100008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2206.168850][T32141] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2206.194594][T32134] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:57 executing program 1: 15:34:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0xde570000}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:57 executing program 5: [ 2206.249139][T32141] EXT4-fs (loop2): bad geometry: first data block 18432 is beyond end of filesystem (64) [ 2206.444543][T32152] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2206.454751][T32152] EXT4-fs (loop0): Invalid log cluster size: 1114114 [ 2206.456236][T32156] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2206.481649][T32148] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2206.502613][T32148] EXT4-fs (loop2): bad geometry: first data block 18432 is beyond end of filesystem (64) 15:34:57 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000004a00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000140)=""/4096) 15:34:57 executing program 5: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000100)=""/202) 15:34:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001200008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2206.638850][T32156] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:34:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:57 executing program 1: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xc) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x10) [ 2206.733673][T32174] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2206.743874][T32174] EXT4-fs (loop0): Invalid log cluster size: 1179650 15:34:57 executing program 5: r0 = fanotify_init(0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) fanotify_mark(r0, 0x15, 0x8000011, r1, 0x0) 15:34:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001300008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2206.838149][T32183] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2206.855700][T32188] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2206.862524][T32188] EXT4-fs (loop3): Can't read superblock on 2nd try 15:34:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="2000000011a1ef"], 0x20}}, 0x0) recvmmsg(r0, &(0x7f00000018c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x34}}], 0x2, 0x0, 0x0) 15:34:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x42, 0x0, "084db7606f379533384f085d68d33dfdc4eb40e0b82a23b56f61cc0ca83aa7952ff965cb07ee8658e9aa5eec3516974602e8f44c3dc29b4d363d261a2a7e0b7832192982e9f210b0c7aaf4f3e552426d"}, 0xd8) [ 2206.888838][T32183] EXT4-fs (loop2): bad geometry: first data block 18944 is beyond end of filesystem (64) [ 2207.018425][T32197] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2207.026634][T32193] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2207.034215][T32188] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2207.045097][T32197] EXT4-fs (loop0): Invalid log cluster size: 1245186 15:34:57 executing program 1: getrandom(&(0x7f0000001480)=""/99, 0x63, 0x2) 15:34:58 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) [ 2207.063416][T32188] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2207.073909][T32193] EXT4-fs (loop2): bad geometry: first data block 18944 is beyond end of filesystem (64) 15:34:58 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000004b00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001400008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:58 executing program 1: select(0x40, &(0x7f0000001380), &(0x7f00000013c0)={0x40}, &(0x7f0000001400), &(0x7f0000001440)={0x0, 0xea60}) 15:34:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x3, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:58 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 15:34:58 executing program 5: sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) getresgid(&(0x7f0000000040), 0x0, 0x0) [ 2207.371691][T32221] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2207.383720][T32221] EXT4-fs (loop0): Invalid log cluster size: 1310722 15:34:58 executing program 1: mq_getsetattr(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 15:34:58 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x17) 15:34:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001b00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2207.489465][T32233] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2207.496605][T32232] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2207.503418][T32232] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2207.526617][T32233] EXT4-fs (loop2): bad geometry: first data block 19200 is beyond end of filesystem (64) 15:34:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000d40)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:34:58 executing program 5: mprotect(&(0x7f0000ff7000/0x8000)=nil, 0x8000, 0xc) 15:34:58 executing program 5: mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/36) [ 2207.650130][T32241] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2207.662794][T32232] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2207.674290][T32241] EXT4-fs (loop2): bad geometry: first data block 19200 is beyond end of filesystem (64) [ 2207.684279][T32232] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2207.719629][T32252] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2207.732690][T32252] EXT4-fs (loop0): Invalid log cluster size: 1769474 15:34:58 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000004c00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:34:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x4, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:58 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x24) 15:34:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@alg={0xe0, 0x10, 0x1, 0x0, 0x0, {{'sha256-arm64\x00'}}}, 0xe0}}, 0x0) 15:34:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001c00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2207.957780][T32289] netlink: 192 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2207.963725][T32287] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2207.981249][T32287] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2208.000760][T32288] EXT4-fs (loop2): Test dummy encryption mode enabled 15:34:58 executing program 5: socket$inet(0x2, 0x3, 0x4) [ 2208.008150][T32288] EXT4-fs (loop2): bad geometry: first data block 19456 is beyond end of filesystem (64) [ 2208.106250][T32295] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2208.111029][T32304] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2208.114282][T32295] EXT4-fs (loop0): Invalid log cluster size: 1835010 [ 2208.120151][T32287] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2208.136700][T32287] EXT4-fs (loop3): Can't read superblock on 2nd try 15:34:59 executing program 1: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x25) 15:34:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000d40)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 2208.152293][T32304] EXT4-fs (loop2): bad geometry: first data block 19456 is beyond end of filesystem (64) 15:34:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x5, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001e00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:59 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000034e00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2208.324869][T32325] EXT4-fs (loop3): Test dummy encryption mode enabled 15:34:59 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = fanotify_init(0x0, 0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) fanotify_mark(r0, 0x65, 0x4000002b, r2, 0x0) 15:34:59 executing program 5: r0 = socket(0x1, 0x1, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) [ 2208.371131][T32325] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2208.411639][T32331] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2208.422509][T32332] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2208.445522][T32332] EXT4-fs (loop0): Invalid log cluster size: 1966082 15:34:59 executing program 5: getcwd(&(0x7f0000000000)=""/253, 0xfd) io_setup(0x6, &(0x7f0000001700)) [ 2208.458493][T32331] EXT4-fs (loop2): bad geometry: first data block 19971 is beyond end of filesystem (64) [ 2208.497564][T32325] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2208.504503][T32325] EXT4-fs (loop3): Can't read superblock on 2nd try 15:34:59 executing program 1: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x22001) 15:34:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002002100008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x6, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:59 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x1d) [ 2208.663360][T32341] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2208.680767][T32341] EXT4-fs (loop2): bad geometry: first data block 19971 is beyond end of filesystem (64) [ 2208.700082][T32356] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2208.707044][T32356] EXT4-fs (loop3): Can't read superblock on 2nd try 15:34:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:34:59 executing program 5: syz_mount_image$squashfs(&(0x7f0000000240)='squashfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[], [{@euid_gt={'euid>'}}]}) 15:34:59 executing program 1: select(0x40, &(0x7f0000001380), &(0x7f00000013c0), &(0x7f0000001400)={0x7}, &(0x7f0000001440)={0x0, 0xea60}) [ 2208.757036][T32356] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2208.764382][T32356] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2208.772218][T32355] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2208.783985][T32355] EXT4-fs (loop0): Invalid log cluster size: 2162690 15:34:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002002200008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:34:59 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000005c00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2208.921575][T32371] squashfs: Unknown parameter 'euid>00000000000000000000' [ 2208.939500][T32372] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2208.950962][T32372] EXT4-fs (loop3): Can't read superblock on 2nd try 15:34:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in, 0x0, 0x0, 0xc5, 0x0, "5fc3dd08af367a339bf41d16566db0f65965f123192de9a58a50acf562fced91dfef7fa59bae8b832d9f12915931051b5f8e9b95b6b972d682d56a252c4954c34313aee23f5958983c4616623478ad7d"}, 0xd8) [ 2208.976985][T32377] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2208.994201][T32377] EXT4-fs (loop0): Invalid log cluster size: 2228226 15:35:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x0, 0x0, 0x0, "9410c7fc6bc357a6af24e933590c59f08eb3953ef7d7530a1e1d02720c13d960b104b6650a5b80e4c9f989ebdb9d7a3f6b8c2458a228f379acbbc9cbff48bc49cd872f5f650b7de45bab881dced26ab3"}, 0xd8) [ 2209.139873][T32381] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2209.155379][T32372] EXT4-fs (loop3): Test dummy encryption mode enabled 15:35:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002002500008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:00 executing program 5: pipe2(&(0x7f0000003ac0), 0x0) [ 2209.200828][T32372] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2209.221603][T32381] EXT4-fs (loop2): bad geometry: first data block 23552 is beyond end of filesystem (64) 15:35:00 executing program 1: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x2) 15:35:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x8, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2209.477780][T32397] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2209.484724][T32397] EXT4-fs (loop0): Invalid log cluster size: 2424834 15:35:00 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @loopback}, 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={[], [], @local}, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x8000000000001f4) 15:35:00 executing program 1: syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000780)="df", 0x1}, {&(0x7f0000000940)="1e8f", 0x2, 0xffffffff}], 0x0, 0x0) [ 2209.566465][T32389] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2209.587341][T32410] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2209.594289][T32410] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2209.621878][T32389] EXT4-fs (loop2): bad geometry: first data block 23552 is beyond end of filesystem (64) 15:35:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002002700008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2209.718220][T32410] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2209.736170][T32410] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:00 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @loopback}, 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={[], [], @local}, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x8000000000001f4) 15:35:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x9, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:00 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000006000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001400)={0x0}, &(0x7f0000001440)=0xc) sched_setaffinity(r1, 0x8, &(0x7f0000001480)=0x81) 15:35:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') read$FUSE(r0, 0x0, 0x0) [ 2209.995585][T32424] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2210.022815][T32424] EXT4-fs (loop0): Invalid log cluster size: 2555906 15:35:00 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x35) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x0, 0x0, 0x67, 0x0, 0x436e1b88, 0x278088e6}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2210.041813][T32436] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2210.051178][T32436] EXT4-fs (loop2): bad geometry: first data block 24576 is beyond end of filesystem (64) 15:35:01 executing program 1: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0}, 0x68) 15:35:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) [ 2210.174838][T32449] ptrace attach of "/root/syz-executor.5"[32448] was attempted by "/root/syz-executor.5"[32449] [ 2210.205318][T32439] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2210.241810][T32439] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2210.257801][T32443] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2210.274915][T32443] EXT4-fs (loop2): bad geometry: first data block 24576 is beyond end of filesystem (64) 15:35:01 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) 15:35:01 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000006800000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x1261, 0x0) 15:35:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002002e00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:01 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f00000000c0)={0x0, 0x0, 0x7fff, 0x4, 0xd9, "1550b6d88c944dd5f2fff5fb5c28302d9bde43", 0xcfc, 0x1}) [ 2210.435381][T32439] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2210.442336][T32439] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2210.498867][T32464] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2210.524350][T32464] EXT4-fs (loop0): Invalid log cluster size: 3014658 [ 2210.533046][T32471] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2210.544375][T32471] EXT4-fs (loop2): bad geometry: first data block 26624 is beyond end of filesystem (64) 15:35:01 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 15:35:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xa, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:01 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x5421, &(0x7f0000000000)) 15:35:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002004800008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:01 executing program 5: r0 = socket(0x1, 0x5, 0x0) ioctl$sock_SIOCINQ(r0, 0x5411, &(0x7f0000000000)) 15:35:01 executing program 1: setgid(0x0) setgroups(0x6, &(0x7f0000000000)=[0x0, 0xee00, 0x0, 0x0, 0x0, 0x0]) [ 2210.818205][T32479] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2210.832728][T32484] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2210.878029][T32479] EXT4-fs (loop2): bad geometry: first data block 26624 is beyond end of filesystem (64) [ 2210.921386][T32484] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x300, 0x0, 0x0, 0x0) 15:35:01 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000006c00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2210.987884][T32501] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2211.004391][T32501] EXT4-fs (loop0): Invalid log cluster size: 4718594 15:35:01 executing program 1: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x23) 15:35:01 executing program 5: mq_open(&(0x7f0000006200)='\'!^@,\'}\x0e\x00', 0x0, 0x0, 0x0) 15:35:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xb, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002004a00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2211.149544][T32509] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2211.168360][T32509] EXT4-fs (loop2): bad geometry: first data block 27648 is beyond end of filesystem (64) 15:35:02 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/ipc\x00') [ 2211.256784][T32517] EXT4-fs (loop3): Test dummy encryption mode enabled 15:35:02 executing program 5: pipe2(&(0x7f0000003ac0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) [ 2211.297400][T32517] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:02 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000007400000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2211.345302][T32525] EXT4-fs (loop0): Test dummy encryption mode enabled 15:35:02 executing program 5: syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x12) 15:35:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/119) 15:35:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xc, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2211.398849][T32525] EXT4-fs (loop0): Invalid log cluster size: 4849666 15:35:02 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 15:35:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000016c0), 0x4) 15:35:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002004b00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2211.525112][T32539] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2211.543260][T32539] EXT4-fs (loop2): bad geometry: first data block 29696 is beyond end of filesystem (64) 15:35:02 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) 15:35:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg$can_bcm(r0, &(0x7f0000000540)={&(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0}, 0x2) [ 2211.603748][T32548] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2211.612658][T32545] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2211.623662][T32548] EXT4-fs (loop2): bad geometry: first data block 29696 is beyond end of filesystem (64) [ 2211.633725][T32545] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2211.697740][T32556] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2211.708107][T32545] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2211.723068][T32556] EXT4-fs (loop0): Invalid log cluster size: 4915202 15:35:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x4c09, 0x0) 15:35:02 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000007500000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2211.738067][T32545] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002004c00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xd, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0xc0481273, 0x0) [ 2211.903492][T32573] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2211.915263][T32576] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2211.924364][T32573] EXT4-fs (loop0): Invalid log cluster size: 4980738 [ 2211.952036][T32576] EXT4-fs (loop2): bad geometry: first data block 29952 is beyond end of filesystem (64) 15:35:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x2002) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 15:35:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002005c00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2212.052491][T32583] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2212.096782][T32583] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x3, 0x0, &(0x7f00000000c0)) 15:35:03 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000007a00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2212.169555][T32592] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2212.191052][T32592] EXT4-fs (loop0): Invalid log cluster size: 6029314 15:35:03 executing program 5: syz_open_dev$vcsn(&(0x7f00000021c0)='/dev/vcs#\x00', 0x47, 0x0) 15:35:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002006000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2212.289771][T32583] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2212.328818][T32583] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2212.420235][T32604] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2212.442674][T32604] EXT4-fs (loop2): bad geometry: first data block 31232 is beyond end of filesystem (64) [ 2212.468014][T32608] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2212.495310][T32608] EXT4-fs (loop0): Invalid log cluster size: 6291458 15:35:03 executing program 1: io_setup(0x6, &(0x7f0000001700)) 15:35:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xe, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:03 executing program 5: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000500)="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", 0x1000}], 0x0, 0x0) 15:35:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002006800008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2212.607425][T32611] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2212.628546][T32611] EXT4-fs (loop2): bad geometry: first data block 31232 is beyond end of filesystem (64) 15:35:03 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, 0x0, 0xf00) [ 2212.704616][T32625] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2212.711767][T32625] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:03 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000007e00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:03 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x200) [ 2212.818927][T32629] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2212.853245][T32629] EXT4-fs (loop0): Invalid log cluster size: 6815746 15:35:03 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self\x00', 0x10400, 0x0) [ 2212.878456][T32625] EXT4-fs (loop3): Test dummy encryption mode enabled 15:35:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002006c00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2212.927938][T32625] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/zero\x00', 0x0, 0x0) mq_notify(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) 15:35:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000022c0)='/dev/null\x00', 0x301080, 0x0) 15:35:03 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340)='/dev/bsg\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x6) 15:35:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xf, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:04 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000008900000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2213.069471][T32649] EXT4-fs (loop0): Test dummy encryption mode enabled 15:35:04 executing program 5: r0 = socket(0x1, 0x2, 0x0) sendmsg$sock(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@txtime={{0x18}}], 0xf}, 0x0) [ 2213.111843][T32649] EXT4-fs (loop0): Invalid log cluster size: 7077890 15:35:04 executing program 1: syz_emit_ethernet(0x26, &(0x7f0000000040)={@multicast, @empty, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, {[@lsrr={0x83, 0x3}]}}}}}}, 0x0) 15:35:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002007400008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x40101283, 0x0) [ 2213.221183][T32663] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2213.233059][T32665] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2213.250834][T32663] EXT4-fs (loop2): bad geometry: first data block 35072 is beyond end of filesystem (64) [ 2213.260688][T32665] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:04 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={0x0}}, 0x0) [ 2213.386633][T32665] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2213.410875][T32672] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2213.418166][T32672] EXT4-fs (loop2): bad geometry: first data block 35072 is beyond end of filesystem (64) 15:35:04 executing program 5: sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 15:35:04 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x24240, 0x0) [ 2213.437614][T32665] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2213.457273][T32683] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2213.489126][T32683] EXT4-fs (loop0): Invalid log cluster size: 7602178 [ 2213.541625][ T34] audit: type=1800 audit(1603380904.426:88): pid=32689 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15925 res=0 errno=0 15:35:04 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffffff8c00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2213.584723][ T34] audit: type=1800 audit(1603380904.426:89): pid=32689 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15925 res=0 errno=0 15:35:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000300)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)='g', 0x1}, {0x0}, {&(0x7f0000000140)="fb", 0x1}], 0x3}], 0x1, 0x0) 15:35:04 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x106800, 0x0) 15:35:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x10, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002007500008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x14, 0x4) 15:35:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='io\x00') read$FUSE(r0, 0x0, 0x0) [ 2213.807055][T32703] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2213.821712][T32703] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2213.840285][T32700] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2213.855622][T32705] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2213.868924][T32700] EXT4-fs (loop2): bad geometry: first data block 36095 is beyond end of filesystem (64) [ 2213.871359][T32705] EXT4-fs (loop0): Invalid log cluster size: 7667714 15:35:04 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x40040, 0x0) 15:35:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x11, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 15:35:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002007a00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}], 0x20}, 0x0) [ 2214.098396][T32714] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2214.110377][T32714] EXT4-fs (loop2): bad geometry: first data block 36095 is beyond end of filesystem (64) [ 2214.134391][T32730] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2214.146641][T32731] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2214.172072][T32730] EXT4-fs (loop0): Invalid log cluster size: 7995394 15:35:05 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00bd17809400000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:05 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa) 15:35:05 executing program 5: getcwd(&(0x7f0000000000)=""/253, 0xfd) 15:35:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002007e00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2214.218094][T32731] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:05 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000780)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 15:35:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x4c04, 0x0) 15:35:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x12, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:05 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x28) 15:35:05 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getpgrp(0xffffffffffffffff) msgget$private(0x0, 0x0) [ 2214.451792][T32750] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2214.453531][T32752] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2214.477597][T32750] EXT4-fs (loop2): bad geometry: first data block 38016 is beyond end of filesystem (64) [ 2214.478386][T32752] EXT4-fs (loop0): Invalid log cluster size: 8257538 [ 2214.524863][T32756] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2214.532223][T32756] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2214.610749][T32756] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2214.619789][T32756] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2214.632460][T32759] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)={0x14}, 0xc0}}, 0x0) [ 2214.687788][T32759] EXT4-fs (loop2): bad geometry: first data block 38016 is beyond end of filesystem (64) 15:35:05 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCINQ(r0, 0x5411, &(0x7f0000000000)) 15:35:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x21, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:05 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffffff9700000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:05 executing program 1: r0 = gettid() ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0) 15:35:05 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') 15:35:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002008900008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:05 executing program 1: move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000ffc000/0x3000)=nil], &(0x7f0000000100)=[0x10001], 0x0, 0x0) [ 2214.969004][ T316] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2214.986576][ T316] EXT4-fs (loop2): bad geometry: first data block 38911 is beyond end of filesystem (64) 15:35:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)={0x2, 0x6, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 15:35:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) [ 2215.032920][ T325] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2215.047593][ T325] EXT4-fs (loop0): Invalid log cluster size: 8978434 15:35:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x22, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:06 executing program 5: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000001680)=[{0x0, 0x0, 0x0}], 0x1, 0x0) io_setup(0x6, &(0x7f0000001700)) [ 2215.155443][ T339] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2215.164744][ T339] EXT4-fs (loop2): bad geometry: first data block 38911 is beyond end of filesystem (64) 15:35:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200bb00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ff4000/0xb000)=nil, 0xb000, 0x0, 0x10, r0, 0x0) 15:35:06 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000b100000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x401070ca, 0x0) 15:35:06 executing program 1: mprotect(&(0x7f0000ff7000/0x8000)=nil, 0x8000, 0x0) [ 2215.389590][ T356] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2215.410971][ T356] EXT4-fs (loop0): Invalid log cluster size: 12255234 15:35:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x23, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:06 executing program 1: syz_mount_image$squashfs(&(0x7f0000000080)='squashfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{0x0, 0x0, 0xfffffffffffff800}], 0x0, &(0x7f00000015c0)=ANY=[]) [ 2215.467093][ T362] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2215.487798][ T362] EXT4-fs (loop2): bad geometry: first data block 45312 is beyond end of filesystem (64) 15:35:06 executing program 5: r0 = epoll_create1(0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 15:35:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200bc00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2215.618104][ T376] Can't find a SQUASHFS superblock on loop1 [ 2215.646835][ T371] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:06 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000100)) [ 2215.661512][ T371] EXT4-fs (loop2): bad geometry: first data block 45312 is beyond end of filesystem (64) 15:35:06 executing program 5: getrandom(&(0x7f0000001480)=""/99, 0x63, 0x0) [ 2215.733561][ T385] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2215.755525][ T376] Can't find a SQUASHFS superblock on loop1 [ 2215.758443][ T385] EXT4-fs (loop0): Invalid log cluster size: 12320770 15:35:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000eaffffff000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x2000481, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x64}}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x24, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:06 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00948017bd00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:06 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x3) [ 2215.921309][ T401] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2215.928575][ T401] EXT4-fs (loop2): bad geometry: first data block 48407 is beyond end of filesystem (64) [ 2216.071123][ T405] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 15:35:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200bd00008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2216.125087][ T405] EXT4-fs (loop1): orphan cleanup on readonly fs [ 2216.136268][ T409] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2216.163995][ T405] EXT4-fs error (device loop1): ext4_orphan_get:1278: comm syz-executor.1: bad orphan inode 33554432 15:35:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 15:35:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x25, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2216.175521][ T405] EXT4-fs (loop1): mounted filesystem without journal. Opts: debug_want_extra_isize=0x0000000000000064,,errors=continue [ 2216.181176][ T409] EXT4-fs (loop2): bad geometry: first data block 48407 is beyond end of filesystem (64) [ 2216.206387][ T424] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2216.227435][ T424] EXT4-fs (loop0): Invalid log cluster size: 12386306 15:35:07 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') r1 = eventfd(0x0) sendfile(r1, r0, &(0x7f0000000080)=0xfff, 0xb78) 15:35:07 executing program 1: 15:35:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002006901008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:07 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000edc000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:07 executing program 5: mq_notify(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x2, @thr={0x0, 0x0}}) [ 2216.549827][ T438] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2216.565733][ T438] EXT4-fs (loop0): Invalid log cluster size: 23658498 15:35:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x10, 0x0, &(0x7f00000000c0)) 15:35:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2e, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002006a01008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:07 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x8000d5, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040014d79cd2000066617400040409000200027400f8", 0x16}], 0x0, &(0x7f0000000280)=ANY=[]) chdir(&(0x7f0000000300)='./file1\x00') r0 = open(&(0x7f0000000240)='./file0\x00', 0x188c5, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4", 0x3) sendfile(r0, r1, 0x0, 0xee000000) 15:35:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x4c05, 0x0) [ 2216.735562][ T451] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2216.747699][ T451] EXT4-fs (loop2): bad geometry: first data block 49389 is beyond end of filesystem (64) [ 2216.836824][ T463] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2216.847394][ T463] EXT4-fs (loop0): Invalid log cluster size: 23724034 [ 2216.873117][ T466] FAT-fs (loop5): bogus number of FAT sectors 15:35:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002006b01008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2216.883781][ T466] FAT-fs (loop5): Can't find a valid FAT filesystem 15:35:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x48, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200f801008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2216.923041][ T461] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:07 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x21, 0x10, 0x0, 0x0) [ 2216.964146][ T461] EXT4-fs (loop2): bad geometry: first data block 49389 is beyond end of filesystem (64) 15:35:08 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffffffea00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:08 executing program 1: io_cancel(0x0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 2217.166914][ T482] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2217.173793][ T482] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:08 executing program 1: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x21) [ 2217.280287][ T487] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2217.288698][ T466] FAT-fs (loop5): bogus number of FAT sectors [ 2217.301582][ T466] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2217.322241][ T487] EXT4-fs (loop0): Invalid log cluster size: 33030146 [ 2217.334952][ T482] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2217.342231][ T482] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:08 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/4\x00') socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) 15:35:08 executing program 5: socket$key(0xf, 0x3, 0x2) select(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000240)={0x8}, 0x0) 15:35:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000402008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x4c, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2217.497364][ T505] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2217.528926][ T505] EXT4-fs (loop2): bad geometry: first data block 60159 is beyond end of filesystem (64) 15:35:08 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) 15:35:08 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffffffef00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2217.658347][ T520] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2217.686963][ T520] EXT4-fs (loop0): Invalid log cluster size: 33816578 15:35:08 executing program 1: setitimer(0x1, &(0x7f0000000000)={{}, {0x77359400}}, 0x0) setitimer(0x1, 0x0, &(0x7f00000000c0)) [ 2217.709784][ T521] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2217.722381][ T521] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:08 executing program 1: [ 2217.770862][ T528] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2217.779929][ T528] EXT4-fs (loop2): bad geometry: first data block 61439 is beyond end of filesystem (64) 15:35:08 executing program 1: 15:35:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002009402008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2217.937014][ T521] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2217.943931][ T521] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2217.965839][ T535] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:08 executing program 1: 15:35:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x5c, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2217.988069][ T535] EXT4-fs (loop2): bad geometry: first data block 61439 is beyond end of filesystem (64) [ 2217.988313][ T541] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2218.014178][ T541] EXT4-fs (loop0): Invalid log cluster size: 43253762 15:35:08 executing program 1: 15:35:09 executing program 5: 15:35:09 executing program 1: 15:35:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002009502008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:09 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000001f300000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2218.276082][ T552] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2218.285974][ T552] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2218.361675][ T552] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2218.391162][ T552] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2218.392327][ T560] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2218.400724][ T564] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:09 executing program 1: 15:35:09 executing program 5: [ 2218.415773][ T564] EXT4-fs (loop2): bad geometry: first data block 62209 is beyond end of filesystem (64) [ 2218.447428][ T560] EXT4-fs (loop0): Invalid log cluster size: 43319298 15:35:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x60, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:09 executing program 1: 15:35:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002009602008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:09 executing program 5: 15:35:09 executing program 1: [ 2218.627758][ T571] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2218.646104][ T581] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2218.659706][ T581] EXT4-fs (loop0): Invalid log cluster size: 43384834 15:35:09 executing program 5: 15:35:09 executing program 5: 15:35:09 executing program 1: [ 2218.676396][ T571] EXT4-fs (loop2): bad geometry: first data block 62209 is beyond end of filesystem (64) 15:35:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000003008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:09 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000001f400000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:09 executing program 1: 15:35:09 executing program 5: [ 2218.936809][ T595] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2218.943801][ T595] EXT4-fs (loop0): Invalid log cluster size: 50331650 15:35:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x68, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:09 executing program 5: [ 2218.981256][ T599] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2219.017804][ T599] EXT4-fs (loop2): bad geometry: first data block 62465 is beyond end of filesystem (64) 15:35:10 executing program 1: 15:35:10 executing program 5: r0 = socket(0x2, 0x3, 0x3) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x81) 15:35:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200f703008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:10 executing program 5: 15:35:10 executing program 1: [ 2219.230635][ T606] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2219.249969][ T606] EXT4-fs (loop2): bad geometry: first data block 62465 is beyond end of filesystem (64) 15:35:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x6c, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2219.328313][ T623] EXT4-fs (loop0): Test dummy encryption mode enabled 15:35:10 executing program 5: [ 2219.372998][ T623] EXT4-fs (loop0): Invalid log cluster size: 66519042 15:35:10 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffff400000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:10 executing program 1: 15:35:10 executing program 5: 15:35:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200f803008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:10 executing program 1: 15:35:10 executing program 1: 15:35:10 executing program 5: 15:35:10 executing program 1: 15:35:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x74, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2219.621434][ T640] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2219.633609][ T645] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2219.637649][ T640] EXT4-fs (loop0): Invalid log cluster size: 66584578 [ 2219.658468][ T645] EXT4-fs (loop2): bad geometry: first data block 62719 is beyond end of filesystem (64) 15:35:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200f903008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:10 executing program 5: [ 2219.753136][ T658] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2219.765483][ T658] EXT4-fs (loop0): Invalid log cluster size: 66650114 15:35:10 executing program 1: [ 2219.806689][ T653] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2219.815985][ T653] EXT4-fs (loop2): bad geometry: first data block 62719 is beyond end of filesystem (64) 15:35:10 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000001f500000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:10 executing program 5: 15:35:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000204008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7a, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:10 executing program 1: 15:35:11 executing program 5: 15:35:11 executing program 1: 15:35:11 executing program 1: [ 2220.135860][ T677] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2220.161478][ T677] EXT4-fs (loop0): Invalid log cluster size: 67239938 15:35:11 executing program 5: [ 2220.276892][ T679] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000604008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x89, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2220.342042][ T679] EXT4-fs (loop2): bad geometry: first data block 62721 is beyond end of filesystem (64) 15:35:11 executing program 1: [ 2220.479533][ T690] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2220.486803][ T701] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2220.496048][ T700] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2220.505948][ T690] EXT4-fs (loop2): bad geometry: first data block 62721 is beyond end of filesystem (64) [ 2220.515832][ T701] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2220.523472][ T700] EXT4-fs (loop0): Invalid log cluster size: 67502082 15:35:11 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffff600000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:11 executing program 5: 15:35:11 executing program 1: 15:35:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001004008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2220.674798][ T701] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2220.685635][ T701] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x204, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2220.785020][ T721] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2220.792147][ T721] EXT4-fs (loop2): bad geometry: first data block 63231 is beyond end of filesystem (64) [ 2220.792259][ T717] EXT4-fs (loop0): Test dummy encryption mode enabled 15:35:11 executing program 1: 15:35:11 executing program 5: [ 2220.908541][ T725] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2220.924012][ T717] EXT4-fs (loop0): Invalid log cluster size: 68157442 [ 2220.950910][ T728] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2220.959314][ T728] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2220.964460][ T725] EXT4-fs (loop2): bad geometry: first data block 63231 is beyond end of filesystem (64) 15:35:11 executing program 5: 15:35:11 executing program 1: 15:35:11 executing program 5: 15:35:12 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000001f800000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:12 executing program 1: 15:35:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001704008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2221.170360][ T728] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2221.195929][ T728] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:12 executing program 1: 15:35:12 executing program 5: 15:35:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x300, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2221.237196][ T745] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2221.250557][ T745] EXT4-fs (loop0): Invalid log cluster size: 68616194 15:35:12 executing program 1: [ 2221.294863][ T747] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2221.301980][ T747] EXT4-fs (loop2): bad geometry: first data block 63489 is beyond end of filesystem (64) 15:35:12 executing program 1: 15:35:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001804008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:12 executing program 5: 15:35:12 executing program 5: 15:35:12 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000001f900000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2221.465337][ T759] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2221.489193][ T759] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:12 executing program 1: 15:35:12 executing program 5: [ 2221.623120][ T765] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2221.640171][ T765] EXT4-fs (loop0): Invalid log cluster size: 68681730 [ 2221.641597][ T769] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2221.655595][ T759] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2221.662797][ T759] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:12 executing program 5: 15:35:12 executing program 1: [ 2221.671936][ T769] EXT4-fs (loop2): bad geometry: first data block 63745 is beyond end of filesystem (64) 15:35:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x3db, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:12 executing program 5: 15:35:12 executing program 1: [ 2221.823646][ T776] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2221.849499][ T776] EXT4-fs (loop2): bad geometry: first data block 63745 is beyond end of filesystem (64) 15:35:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001904008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:12 executing program 1: [ 2221.927135][ T789] EXT4-fs (loop3): Test dummy encryption mode enabled 15:35:12 executing program 5: 15:35:12 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffdf900000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2221.981419][ T789] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:12 executing program 5: 15:35:12 executing program 1: 15:35:13 executing program 5: [ 2222.102397][ T803] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2222.109500][ T803] EXT4-fs (loop2): bad geometry: first data block 63997 is beyond end of filesystem (64) 15:35:13 executing program 1: [ 2222.142741][ T798] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2222.148992][ T789] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2222.149717][ T798] EXT4-fs (loop0): Invalid log cluster size: 68747266 [ 2222.173037][ T789] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:13 executing program 5: 15:35:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x3dc, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:13 executing program 1: 15:35:13 executing program 5: 15:35:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001a04008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2222.343982][ T809] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2222.379264][ T809] EXT4-fs (loop2): bad geometry: first data block 63997 is beyond end of filesystem (64) 15:35:13 executing program 5: 15:35:13 executing program 1: [ 2222.427625][ T820] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2222.449679][ T820] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:13 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffffb00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:13 executing program 5: 15:35:13 executing program 1: [ 2222.655089][ T828] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2222.661907][ T828] EXT4-fs (loop0): Invalid log cluster size: 68812802 15:35:13 executing program 1: [ 2222.712623][ T820] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2222.739852][ T820] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001b04008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:13 executing program 1: 15:35:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x3dd, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:13 executing program 1: [ 2222.880013][ T842] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2222.918403][ T842] EXT4-fs (loop2): bad geometry: first data block 64511 is beyond end of filesystem (64) 15:35:13 executing program 5: [ 2223.026032][ T848] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2223.060767][ T848] EXT4-fs (loop0): Invalid log cluster size: 68878338 15:35:14 executing program 1: 15:35:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x402, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2223.104443][ T855] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2223.111343][ T855] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2223.117281][ T849] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:14 executing program 1: [ 2223.194679][ T849] EXT4-fs (loop2): bad geometry: first data block 64511 is beyond end of filesystem (64) 15:35:14 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffdfd00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:14 executing program 5: 15:35:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001c04008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:14 executing program 1: 15:35:14 executing program 5: 15:35:14 executing program 1: 15:35:14 executing program 1: [ 2223.359040][ T866] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2223.375380][ T866] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:14 executing program 1: 15:35:14 executing program 5: [ 2223.484122][ T879] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2223.489833][ T877] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2223.500240][ T866] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2223.506734][ T877] EXT4-fs (loop0): Invalid log cluster size: 68943874 [ 2223.514270][ T879] EXT4-fs (loop2): bad geometry: first data block 65021 is beyond end of filesystem (64) [ 2223.524424][ T866] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:14 executing program 5: 15:35:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x406, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:14 executing program 1: [ 2223.738356][ T888] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2223.753965][ T888] EXT4-fs (loop2): bad geometry: first data block 65021 is beyond end of filesystem (64) [ 2223.889898][ T898] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2223.903546][ T898] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:14 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffffd00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001d04008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:14 executing program 5: 15:35:14 executing program 1: 15:35:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x410, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:14 executing program 1: 15:35:14 executing program 5: 15:35:15 executing program 5: 15:35:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) dup2(r0, r1) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) [ 2224.084608][ T905] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2224.091472][ T905] EXT4-fs (loop0): Invalid log cluster size: 69009410 15:35:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010025, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket(0x11, 0xa, 0x0) tkill(r1, 0x1000100000016) [ 2224.154165][ T913] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2224.171641][ T910] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2224.221774][ T913] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2224.242619][ T910] EXT4-fs (loop2): bad geometry: first data block 65023 is beyond end of filesystem (64) 15:35:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001e04008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000580)=0x80) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) shutdown(r3, 0x0) [ 2224.392416][ T922] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2224.399478][ T922] EXT4-fs (loop2): bad geometry: first data block 65023 is beyond end of filesystem (64) 15:35:15 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffffe00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) close(r0) socket$nl_route(0x10, 0x3, 0x0) getpeername$inet(r0, 0x0, &(0x7f0000004d40)) 15:35:15 executing program 5: sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, 0x0, 0x2b8fcfcaa8cf004a) [ 2224.482734][ T913] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2224.505628][ T913] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:15 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x1ff) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x14, 0x0, &(0x7f0000000300)) [ 2224.610961][ T944] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2224.634540][ T944] EXT4-fs (loop0): Invalid log cluster size: 69074946 [ 2224.638710][ T940] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x500, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:15 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$inet(r1, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x20044800) [ 2224.652067][ T940] EXT4-fs (loop2): bad geometry: first data block 65279 is beyond end of filesystem (64) 15:35:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000080)={0x77359400}, 0x10) 15:35:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001f04008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2224.729716][ T951] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2224.743232][ T951] EXT4-fs (loop2): bad geometry: first data block 65279 is beyond end of filesystem (64) 15:35:15 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000240)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, 0x0) 15:35:15 executing program 5: r0 = socket(0x10, 0x2, 0x2) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 2224.854434][ T960] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2224.879499][ T960] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2224.897930][ T970] EXT4-fs (loop0): Test dummy encryption mode enabled 15:35:15 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000fff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2224.904976][ T970] EXT4-fs (loop0): Invalid log cluster size: 69140482 15:35:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(r0, 0x4b36, 0x0) 15:35:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = dup2(r1, r3) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x1c, &(0x7f0000000000)={'filter\x00', 0x2, [{}, {}]}, 0x48) 15:35:15 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x0, 0x0) close(r0) socket$inet(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x1, 0x0, 0x0) 15:35:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002002004008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2225.093396][ T960] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2225.114165][ T960] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:16 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyS3\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2225.194834][ T989] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2225.233878][ T989] EXT4-fs (loop2): bad geometry: first data block 65295 is beyond end of filesystem (64) 15:35:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NET_DM_CMD_START(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20040854) 15:35:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x600, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2225.306554][ T998] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2225.313365][ T998] EXT4-fs (loop0): Invalid log cluster size: 69206018 15:35:16 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyS3\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2225.347148][ T996] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2225.367268][ T996] EXT4-fs (loop2): bad geometry: first data block 65295 is beyond end of filesystem (64) [ 2225.415671][ T1011] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2225.422635][ T1011] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002002104008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x604, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:16 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0x5450, 0x0) 15:35:16 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffffefff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:16 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyS3\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2225.708198][ T1022] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2225.717248][ T1022] EXT4-fs (loop0): Invalid log cluster size: 69271554 [ 2225.733289][ T1021] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2225.750172][ T1021] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={0x0}}, 0x20008000) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x24048011) 15:35:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000005008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:16 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyS3\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2225.864438][ T1031] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2225.882827][ T1031] EXT4-fs (loop2): bad geometry: first data block 65519 is beyond end of filesystem (64) [ 2225.900255][ T1021] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2225.910945][ T1021] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2225.950758][ T1037] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2225.963072][ T1044] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2226.004582][ T1037] EXT4-fs (loop2): bad geometry: first data block 65519 is beyond end of filesystem (64) [ 2226.016698][ T1044] EXT4-fs (loop0): Invalid log cluster size: 83886082 15:35:16 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyS3\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 15:35:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x700, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:17 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffffbff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000006008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:17 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyS3\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) [ 2226.309184][ T1064] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2226.314029][ T1066] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2226.322921][ T1064] EXT4-fs (loop2): bad geometry: first data block 65531 is beyond end of filesystem (64) [ 2226.334371][ T1066] EXT4-fs (loop0): Invalid log cluster size: 100663298 [ 2226.348122][ T1065] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2226.355699][ T1065] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:17 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyS3\x00', 0x0, 0x0) close(r0) 15:35:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000406008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2226.510627][ T1065] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2226.536694][ T1065] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2226.572623][ T1073] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2226.614954][ T1073] EXT4-fs (loop2): bad geometry: first data block 65531 is beyond end of filesystem (64) 15:35:17 executing program 5: close(0xffffffffffffffff) 15:35:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x900, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2226.671205][ T1083] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2226.687286][ T1083] EXT4-fs (loop0): Invalid log cluster size: 100925442 15:35:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000001c0)={0x0, 0x40, &(0x7f0000000180)={0x0}}, 0x0) r2 = dup2(r1, r0) sendmsg$NL80211_CMD_NOTIFY_RADAR(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 15:35:17 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00ffefffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:17 executing program 5: close(0xffffffffffffffff) 15:35:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000007008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2226.930580][ T1100] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2226.953752][ T1099] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2226.968076][ T1109] EXT4-fs (loop0): Test dummy encryption mode enabled 15:35:17 executing program 1: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) sched_getaffinity(r1, 0x8, &(0x7f0000000280)) [ 2226.985012][ T1099] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) [ 2226.989400][ T1100] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2226.995473][ T1109] EXT4-fs (loop0): Invalid log cluster size: 117440514 15:35:17 executing program 5: close(0xffffffffffffffff) 15:35:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000009008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:17 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001800)) write$P9_RWALK(r0, 0x0, 0x0) 15:35:18 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 15:35:18 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) [ 2227.174003][ T1100] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2227.174120][ T1112] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2227.187706][ T1100] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2227.202052][ T1112] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) close(r0) socket$unix(0x1, 0x5, 0x0) tkill(r1, 0x1000000000016) 15:35:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xa00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:18 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fffbffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2227.333734][ T1127] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2227.347203][ T1127] EXT4-fs (loop0): Invalid log cluster size: 150994946 15:35:18 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) [ 2227.492100][ T1144] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2227.492295][ T1140] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2227.506031][ T1144] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:18 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyS3\x00', 0x0, 0x0) close(0xffffffffffffffff) 15:35:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000a008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:18 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyS3\x00', 0x0, 0x0) close(0xffffffffffffffff) 15:35:18 executing program 1: r0 = socket(0x11, 0x2, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 2227.575999][ T1140] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) [ 2227.592566][ T1144] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2227.602349][ T1144] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:18 executing program 1: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/88, 0x58) 15:35:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xb00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:18 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyS3\x00', 0x0, 0x0) close(0xffffffffffffffff) [ 2227.657475][ T1160] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2227.682880][ T1160] EXT4-fs (loop0): Invalid log cluster size: 167772162 15:35:18 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001880)='/proc/thread-self\x00', 0x123004, 0x0) 15:35:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000b008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:18 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f00000001c0)={0x6, 'lo\x00'}) [ 2227.796662][ T1170] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2227.798505][ T1178] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2227.810692][ T1178] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2227.819760][ T1170] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) [ 2227.878022][ T1178] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2227.885005][ T1178] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2227.887955][ T1184] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2227.916100][ T1184] EXT4-fs (loop0): Invalid log cluster size: 184549378 15:35:18 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00f9fdffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 15:35:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xc00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:18 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0x5450, 0x0) 15:35:18 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/vcs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(r0, 0x0, 0x0) 15:35:19 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fd/3\x00') ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x5409, 0x0) 15:35:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000c008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2228.045998][ T1197] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2228.083980][ T1197] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) sched_setaffinity(r1, 0x8, &(0x7f00000000c0)=0x37) [ 2228.129309][ T1197] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2228.144540][ T1197] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:19 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 15:35:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xd00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) [ 2228.299894][ T1213] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2228.310155][ T1213] EXT4-fs (loop0): Invalid log cluster size: 201326594 [ 2228.326458][ T1211] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2228.334054][ T1211] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) write$P9_ROPEN(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) tkill(r2, 0x1000000000016) 15:35:19 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fdfdffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:19 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x5450) 15:35:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000d008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:19 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 2228.523430][ T1236] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2228.547998][ T1242] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2228.558855][ T1236] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:19 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)) [ 2228.565082][ T1242] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:19 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x10000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 2228.609044][ T1251] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2228.616355][ T1247] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2228.616413][ T1251] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x6, 0x0) dup3(r0, r1, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 2228.649478][ T1247] EXT4-fs (loop0): Invalid log cluster size: 218103810 15:35:19 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f007fffffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:19 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'sit0\x00'}) [ 2228.732677][ T1236] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2228.739778][ T1236] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xe00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000e008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:19 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup3(r1, r0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x14, 0x0, &(0x7f0000000240)) [ 2228.846185][ T1270] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2228.919075][ T1270] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) dup2(r0, r1) r2 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100b4000000000000006200000008000300"], 0x54}, 0x1, 0x0, 0x0, 0x20040890}, 0x2001000) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000001540)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001500)={&(0x7f00000014c0)={0x38, r2, 0x8, 0x70bd2b, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x100, 0xf}}}}, [@NL80211_ATTR_DURATION={0x8, 0x57, 0x5}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3c8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3d5}]]}, 0x38}, 0x1, 0x0, 0x0, 0x41051}, 0x20008040) [ 2229.005084][ T1280] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2229.011935][ T1280] EXT4-fs (loop0): Invalid log cluster size: 234881026 15:35:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000f008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2229.048210][ T1281] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2229.111975][ T1281] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) [ 2229.126981][ T1292] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2229.149716][ T1292] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000410008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup(r0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x4) tkill(r2, 0x1000000000015) 15:35:20 executing program 5: setrlimit(0x7, &(0x7f0000000080)) sched_setscheduler(0x0, 0x5, &(0x7f0000001c00)) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) 15:35:20 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f008cffffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:20 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGBITSND(r0, 0x5451, 0x0) [ 2229.310762][ T1300] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2229.337615][ T1292] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2229.349689][ T1292] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:20 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0097ffffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup2(r0, r1) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) [ 2229.383024][ T1300] EXT4-fs (loop0): Invalid log cluster size: 268697602 15:35:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xf00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r0) socket(0xa, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@empty, @loopback}, 0x8) [ 2229.606956][ T1316] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2229.639543][ T1316] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002002010008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2229.735476][ T1331] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2229.744571][ T1331] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:20 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) write$cgroup_netprio_ifpriomap(r2, 0x0, 0x0) 15:35:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1004, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000280)='G', 0x1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x40003a0, 0x0, 0x0) tkill(r1, 0x14) r2 = fcntl$dupfd(r0, 0x0, r0) sendmmsg$unix(r2, &(0x7f0000003500)=[{0x0, 0x0, 0x0}], 0x1, 0x0) [ 2229.920180][ T1338] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2229.932156][ T1321] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2229.940453][ T1338] EXT4-fs (loop0): Invalid log cluster size: 270532610 [ 2229.947949][ T1321] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:20 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) 15:35:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup2(r0, r1) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000000), 0x4) 15:35:20 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00eaffffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000011008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1020, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:21 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, 0x0, 0x0) 15:35:21 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000600)='/dev/full\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={0x0}}, 0x0) [ 2230.261464][ T1365] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2230.270831][ T1362] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2230.278416][ T1362] EXT4-fs (loop0): Invalid log cluster size: 285212674 [ 2230.289162][ T1365] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000012008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:21 executing program 5: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x5450, r0) [ 2230.549235][ T1373] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2230.558483][ T1384] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2230.567709][ T1373] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) write$cgroup_devices(r0, 0x0, 0x0) 15:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1100, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:21 executing program 5: [ 2230.650025][ T1384] EXT4-fs (loop0): Invalid log cluster size: 301989890 15:35:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) dup2(r1, r0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/152, 0x98) 15:35:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000500)="7e5c96cd", 0x4) 15:35:21 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00efffffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1200, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000013008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$P9_RXATTRCREATE(r1, 0x0, 0xfffffe06) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 15:35:21 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x5421, &(0x7f0000000200)=""/237) [ 2230.949022][ T1413] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2230.985782][ T1413] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) [ 2231.062866][ T1420] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2231.079369][ T1420] EXT4-fs (loop0): Invalid log cluster size: 318767106 15:35:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={0x0}}, 0x0) 15:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1c9a, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:22 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 2231.180257][ T1427] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2231.198076][ T1427] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x815) 15:35:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000014008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:22 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000004280)={0x0, 0x0, &(0x7f0000004240)={0x0}}, 0x0) 15:35:22 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00f4ffffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1c9b, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2231.398003][ T1450] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2231.432899][ T1450] EXT4-fs (loop0): Invalid log cluster size: 335544322 15:35:22 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0x0) dup2(r0, r1) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000300), 0x4) 15:35:22 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x0) [ 2231.507986][ T1458] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2231.577500][ T1458] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:22 executing program 1: mkdir(&(0x7f0000000080)='\x00', 0x0) 15:35:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000417008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup3(r0, r1, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000040)={0x6, 'ip6gretap0\x00'}) [ 2231.839783][ T1461] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2231.843504][ T1478] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2231.853742][ T1478] EXT4-fs (loop0): Invalid log cluster size: 386138114 [ 2231.861608][ T1461] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2010, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000418008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:22 executing program 1: r0 = epoll_create(0x1) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:35:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000100)=0x80) dup3(r0, r1, 0x0) setsockopt(r1, 0x1, 0x9, &(0x7f0000000240)="324e8f6e", 0x4) 15:35:22 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00f6ffffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:22 executing program 1: r0 = inotify_init1(0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 15:35:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TCSETXF(r0, 0x5451, 0x0) [ 2232.163562][ T1499] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2232.170483][ T1503] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2232.178350][ T1499] EXT4-fs (loop0): Invalid log cluster size: 402915330 15:35:23 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) 15:35:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2100, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000419008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:23 executing program 5: sysfs$1(0x1, &(0x7f00000000c0)='[]+\x00') [ 2232.248889][ T1503] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x20000440) setsockopt$inet6_udp_int(r0, 0x29, 0x0, 0x0, 0x0) 15:35:23 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) [ 2232.418725][ T1525] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2232.434519][ T1525] EXT4-fs (loop0): Invalid log cluster size: 419692546 [ 2232.450117][ T1514] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2200, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2232.462496][ T1514] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200041a008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:23 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x5450, 0x0) 15:35:23 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fbffffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:23 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x54480, 0x0) [ 2232.759122][ T1551] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2232.766857][ T1556] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2232.782708][ T1551] EXT4-fs (loop0): Invalid log cluster size: 436469762 15:35:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2300, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$TIOCGISO7816(r2, 0x80285442, 0x0) [ 2232.815525][ T1556] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001b008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2400, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2233.003499][ T1565] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2233.029507][ T1577] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2233.036474][ T1577] EXT4-fs (loop0): Invalid log cluster size: 452984834 [ 2233.048058][ T1565] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:24 executing program 1: r0 = socket(0x2, 0x3, 0x57b0) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 15:35:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$CHAR_RAW_ALIGNOFF(r0, 0x127a, 0x0) 15:35:24 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00fdffffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200041b008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) dup3(r0, r1, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 15:35:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2500, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close(r1) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) [ 2233.480549][ T1601] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2233.492603][ T1601] EXT4-fs (loop0): Invalid log cluster size: 453246978 15:35:24 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x550d, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)) [ 2233.651970][ T1604] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2233.665199][ T1604] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001c008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4000000) [ 2233.780033][ T1626] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2233.788059][ T1626] EXT4-fs (loop0): Invalid log cluster size: 469762050 15:35:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2e00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:24 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00feffffff00000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:24 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:35:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200041c008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:24 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000)='freezer.state\x00', 0x2, 0x0) write$P9_RAUTH(r0, 0x0, 0x0) 15:35:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$KDFONTOP_GET(r1, 0x5428, 0x0) [ 2233.980002][ T1637] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2234.014456][ T1637] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = eventfd(0x0) dup2(r0, r1) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000100)) [ 2234.045994][ T1643] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2234.071879][ T1643] EXT4-fs (loop0): Invalid log cluster size: 470024194 15:35:25 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') r1 = ioctl$NS_GET_PARENT(r0, 0x5421, 0x748000) ioctl$BTRFS_IOC_BALANCE_CTL(r1, 0x5421, 0x400003) 15:35:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x3f00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:25 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x5450, 0x0) 15:35:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200041d008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2234.213675][ T1657] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2234.228379][ T1657] EXT4-fs (loop2): bad geometry: first data block 65535 is beyond end of filesystem (64) 15:35:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) 15:35:25 executing program 1: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) unlink(&(0x7f00000001c0)='\x00') 15:35:25 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000400000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2234.383192][ T1676] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2234.389984][ T1676] EXT4-fs (loop0): Invalid log cluster size: 486801410 15:35:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x4000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:25 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 15:35:25 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x5451, 0x0) 15:35:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001e008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2234.595476][ T1697] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2234.602273][ T1697] EXT4-fs (loop2): bad block size 16384 15:35:25 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 2234.698696][ T1709] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2234.715073][ T1709] EXT4-fs (loop0): Invalid log cluster size: 503316482 [ 2234.768271][ T1714] EXT4-fs (loop3): Test dummy encryption mode enabled 15:35:25 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000001000000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200041e008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2234.817481][ T1714] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) sendto$unix(r1, 0x0, 0x2b4, 0x80020003ffc, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x4000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:35:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1261, 0x0) 15:35:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x4800, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200041f008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:26 executing program 1: r0 = socket(0x11, 0xa, 0x0) fcntl$F_SET_RW_HINT(r0, 0x3, 0x0) [ 2235.054935][ T1726] EXT4-fs (loop2): Unsupported filesystem blocksize 67108864 (16 log_block_size) 15:35:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_PROBE_CLIENT(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 15:35:26 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) r2 = dup2(r1, r1) write$P9_RMKDIR(r2, 0x0, 0x18) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) [ 2235.181140][ T1739] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2235.201439][ T1738] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2235.222913][ T1734] EXT4-fs (loop2): Unsupported filesystem blocksize 67108864 (16 log_block_size) [ 2235.259543][ T1738] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2235.267006][ T1739] EXT4-fs (loop0): Invalid log cluster size: 520355842 15:35:26 executing program 1: r0 = socket(0x2, 0xa, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f00000004c0)={&(0x7f0000000000), 0x27, &(0x7f0000000480)={0x0}}, 0x0) 15:35:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x5450, 0x0) 15:35:26 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000001000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000020008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2235.468841][ T1738] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2235.483795][ T1738] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x20000050) 15:35:26 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3ff, 0x0) close(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') readlinkat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/92, 0x5c) [ 2235.513775][ T1765] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2235.520576][ T1765] EXT4-fs (loop2): Invalid log block size: 256 15:35:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x4c00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x26e1, 0x0) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x1}) 15:35:26 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 2235.633379][ T1772] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2235.660864][ T1784] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2235.667851][ T1784] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2235.669789][ T1772] EXT4-fs (loop0): Invalid log cluster size: 536870914 15:35:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, 0x0) 15:35:26 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = accept$unix(r0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x5451, 0x0) 15:35:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x5c00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2235.729342][ T1779] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:26 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCDELRT(r0, 0x541b, &(0x7f00000004c0)={0x0, @xdp, @ax25={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}}) [ 2235.778668][ T1779] EXT4-fs (loop2): Invalid log block size: 256 15:35:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000420008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:26 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000e01000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() sendmsg$NL80211_CMD_SET_MCAST_RATE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r4, 0x0) tkill(r2, 0x1000000000016) 15:35:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f0000002c40)={0xffffffffffffffff}, 0x0) dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={0x0}}, 0x0) 15:35:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x6000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2236.081939][ T1812] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2236.103065][ T1812] EXT4-fs (loop0): Invalid log cluster size: 537133058 15:35:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) dup2(r2, r1) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'bond_slave_1\x00'}) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 2236.143956][ T1825] EXT4-fs (loop2): Unsupported filesystem blocksize 16777216 (270 log_block_size) 15:35:27 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) accept$unix(r0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 15:35:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002001020008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x6800, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2236.311450][ T1834] EXT4-fs (loop2): Unsupported filesystem blocksize 16777216 (270 log_block_size) 15:35:27 executing program 1: r0 = epoll_create1(0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)) [ 2236.361595][ T1841] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2236.368600][ T1841] EXT4-fs (loop0): Invalid log cluster size: 537919490 15:35:27 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup3(r1, r0, 0x0) ioctl$FICLONERANGE(r0, 0x5452, &(0x7f00000000c0)) 15:35:27 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, &(0x7f0000000080)=0x80) ioctl$BLKPG(r1, 0x5450, 0x0) 15:35:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x6c00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000021008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:27 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000002000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='uid_map\x00') dup2(r0, r1) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000001540), 0x4) [ 2236.638160][ T1874] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2236.661686][ T1877] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2236.661737][ T1874] EXT4-fs (loop0): Invalid log cluster size: 553648130 15:35:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x804) 15:35:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SYNC(r0, 0x5450, 0x0) [ 2236.688024][ T1877] EXT4-fs (loop2): Invalid log block size: 512 15:35:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000421008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7400, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) 15:35:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x40044591, 0x0) 15:35:27 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000008000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2236.933384][ T1895] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2236.948032][ T1895] EXT4-fs (loop0): Invalid log cluster size: 553910274 15:35:27 executing program 1: sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) 15:35:28 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='oom_adj\x00') write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT=r0], 0xb) 15:35:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7a00, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000022008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:28 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg$sock(r0, &(0x7f0000001640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40090) [ 2237.109203][ T1912] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2237.142577][ T1912] EXT4-fs (loop2): Invalid log block size: 2048 15:35:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x77359400}, 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r1 = dup(r0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = gettid() sendmsg$NL80211_CMD_CHANNEL_SWITCH(r1, &(0x7f0000004780)={0x0, 0x0, &(0x7f0000004740)={0x0}}, 0x0) tkill(r2, 0x40100c000000013) [ 2237.319797][ T1926] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2237.334029][ T1918] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2237.352739][ T1926] EXT4-fs (loop0): Invalid log cluster size: 570425346 [ 2237.359872][ T1918] EXT4-fs (loop2): Invalid log block size: 2048 15:35:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x8900, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:28 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000080000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:28 executing program 5: pselect6(0x14, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000002c0), &(0x7f0000000340)={0x0}) [ 2237.564732][ T1943] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2237.571630][ T1943] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000025008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20040000) 15:35:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$TIPC_NL_KEY_FLUSH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000001) [ 2237.748091][ T1951] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2237.792776][ T1943] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2237.817867][ T1951] EXT4-fs (loop2): Invalid log block size: 32768 15:35:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.memory_spread_slab\x00', 0x2, 0x0) [ 2237.837760][ T1966] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2237.852085][ T1943] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2237.852683][ T1966] EXT4-fs (loop0): Invalid log cluster size: 620756994 15:35:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e22, @remote}, 0x10) getpeername(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0xd) dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='cubic\x00', 0x6) 15:35:28 executing program 5: r0 = timerfd_create(0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 15:35:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200d126008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x9a1c, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:29 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000008f000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:29 executing program 5: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000001e00)) 15:35:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$PIO_CMAP(r1, 0x4b66, 0x0) [ 2238.189692][ T1981] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2238.202677][ T1984] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2238.212576][ T1981] EXT4-fs (loop0): Invalid log cluster size: 651231234 [ 2238.222143][ T1984] EXT4-fs (loop2): Invalid log block size: 36608 15:35:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000200)) 15:35:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept$packet(r1, 0x0, 0x0) sendmsg$sock(r2, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) [ 2238.455925][ T1996] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2238.479275][ T1996] EXT4-fs (loop2): Invalid log block size: 36608 15:35:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000027008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x9b1c, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:29 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x5450, 0x0) 15:35:29 executing program 1: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 15:35:29 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000002000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xdb03, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2238.716068][ T2014] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2238.753090][ T2014] EXT4-fs (loop0): Invalid log cluster size: 654311426 15:35:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8907, 0x0) 15:35:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "ff000000000000000000000000000000000005"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, 0x0) 15:35:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200002e008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2238.907327][ T2034] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2238.927751][ T2034] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xdc03, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2238.995778][ T2034] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2238.999644][ T2049] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2239.015763][ T2049] EXT4-fs (loop0): Invalid log cluster size: 771751938 [ 2239.023369][ T2034] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:29 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 2239.055235][ T2034] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated 15:35:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200003f008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2239.122707][ T2034] EXT4-fs (loop2): get root inode failed 15:35:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xdd03, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x17, 0x0, 0x0) 15:35:30 executing program 1: sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, 0x0, 0x743c921f9bc36b2) [ 2239.180569][ T2034] EXT4-fs (loop2): mount failed [ 2239.186490][ T2066] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2239.199934][ T2066] EXT4-fs (loop0): Invalid log cluster size: 1056964610 15:35:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000040008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2239.334256][ T2051] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2239.356381][ T2051] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2239.382495][ T2051] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2239.398777][ T2051] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2239.424459][ T2051] EXT4-fs: failed to create workqueue [ 2239.442668][ T2051] EXT4-fs (loop2): mount failed 15:35:30 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000003000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:30 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={0x0}}, 0x0) 15:35:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x24000880) 15:35:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xedc0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2239.558351][ T2085] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2239.578735][ T2085] EXT4-fs (loop0): Invalid log cluster size: 1073741826 15:35:30 executing program 1: r0 = inotify_init1(0x0) ioctl$EVIOCGABS0(r0, 0x5450, 0x0) 15:35:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000048008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_crypto(0x10, 0x3, 0x15) dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:35:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = eventfd(0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 15:35:30 executing program 5: r0 = epoll_create(0xc5) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 15:35:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:35:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r0, r1) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) [ 2239.856144][ T2112] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2239.862649][ T2115] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2239.871018][ T2115] EXT4-fs (loop0): Invalid log cluster size: 1207959554 [ 2239.886075][ T2112] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2239.895866][ T2112] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 15:35:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xff0f, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2239.905986][ T2112] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2239.930633][ T2112] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2239.943422][ T2112] EXT4-fs (loop2): get root inode failed [ 2239.949152][ T2112] EXT4-fs (loop2): mount failed [ 2240.095542][ T2122] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2240.105225][ T2122] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2240.126615][ T2122] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2240.141753][ T2122] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2240.156627][ T2122] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2240.173355][ T2122] EXT4-fs (loop2): get root inode failed [ 2240.179110][ T2122] EXT4-fs (loop2): mount failed 15:35:31 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000004000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200004a008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_ABORT_SCAN(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 15:35:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x1000c080) 15:35:31 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8953, &(0x7f0000000000)={'wlan1\x00'}) 15:35:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x20000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$CHAR_RAW_ROSET(r1, 0x125d, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000016) [ 2240.306531][ T2148] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2240.314272][ T2148] EXT4-fs (loop0): Invalid log cluster size: 1241513986 15:35:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) flock(r0, 0x8) 15:35:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200004b008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2240.442835][ T2157] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2240.476157][ T2157] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup2(r1, r0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 15:35:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x40000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2240.537972][ T2157] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2240.549764][ T2157] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x7, 0x0, 0x0) [ 2240.579566][ T2176] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2240.586943][ T2157] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2240.614878][ T2176] EXT4-fs (loop0): Invalid log cluster size: 1258291202 [ 2240.650429][ T2157] EXT4-fs (loop2): get root inode failed [ 2240.676015][ T2157] EXT4-fs (loop2): mount failed [ 2240.882267][ T2172] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2240.897390][ T2172] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2240.913741][ T2172] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2240.940415][ T2172] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2240.990552][ T2172] EXT4-fs: failed to create workqueue [ 2241.001527][ T2172] EXT4-fs (loop2): mount failed 15:35:32 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000005000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, 0x0, 0x0) 15:35:32 executing program 1: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/attr/current\x00', 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 15:35:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200004c008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x80000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:32 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x5451, 0x0) [ 2241.220333][ T2228] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2241.232382][ T2228] EXT4-fs (loop0): Invalid log cluster size: 1275068418 15:35:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f0000000140)) 15:35:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200005c008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x80040, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:32 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) getrandom(&(0x7f0000000080)=""/4096, 0x1000, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, 0x0) 15:35:32 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$CHAR_RAW_HDIO_GETGEO(r1, 0x301, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x3938700}, {0x0, 0x1c9c380}}, 0x0) 15:35:32 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) r2 = dup2(r1, r1) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$apparmor_current(r2, 0x0, 0x0) dup2(r3, r1) tkill(r0, 0x1000000000016) [ 2241.354324][ T2238] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2241.378771][ T2249] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2241.380976][ T2238] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2241.391157][ T2249] EXT4-fs (loop0): Invalid log cluster size: 1543503874 [ 2241.459367][ T2238] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2241.515670][ T2238] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2241.646219][ T2238] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2241.726765][ T2238] EXT4-fs (loop2): get root inode failed [ 2241.777570][ T2238] EXT4-fs (loop2): mount failed [ 2241.864187][ T2253] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2241.879017][ T2253] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2241.974181][ T2253] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2242.031304][ T2253] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2242.067750][ T2253] EXT4-fs: failed to create workqueue [ 2242.091102][ T2253] EXT4-fs (loop2): mount failed 15:35:33 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000006000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xc0000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000060008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:33 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x5450, 0x0) [ 2242.315335][ T2283] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2242.334101][ T2283] EXT4-fs (loop0): Invalid log cluster size: 1610612738 15:35:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2242.367188][ T2286] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2242.378175][ T2286] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2242.432277][ T2286] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2242.454423][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 15:35:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x400000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000068008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2242.533823][ T2286] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x2bb, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x8801) close(r0) socket$unix(0x1, 0x1, 0x0) tkill(r1, 0x1000000000016) [ 2242.598473][ T2286] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2242.657379][ T2307] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2242.664627][ T2305] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2242.677102][ T2286] EXT4-fs (loop2): get root inode failed [ 2242.705903][ T2307] EXT4-fs (loop0): Invalid log cluster size: 1744830466 [ 2242.723806][ T2305] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2242.730607][ T2286] EXT4-fs (loop2): mount failed 15:35:33 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 15:35:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000169008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2242.941358][ T2305] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2242.948716][ T2319] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2242.974639][ T2305] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2242.996742][ T2319] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2243.032050][ T2324] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2243.046686][ T2324] EXT4-fs (loop0): Invalid log cluster size: 1761673218 [ 2243.055000][ T2319] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2243.138184][ T2319] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2243.183572][ T2319] EXT4-fs: failed to create workqueue [ 2243.217955][ T2319] EXT4-fs (loop2): mount failed 15:35:34 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r0, r1, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) 15:35:34 executing program 1: r0 = socket(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000002a40)={&(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c, 0x0}, 0x20000068) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0xa50f4bd75bacdd94) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) shutdown(r0, 0x0) 15:35:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xe0ffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200016a008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:34 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000007000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2243.549112][ T2341] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2243.566373][ T2341] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2243.612524][ T2342] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2243.631589][ T2341] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2243.654024][ T2342] EXT4-fs (loop0): Invalid log cluster size: 1778450434 15:35:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r1 = dup(r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) tkill(r2, 0x1000000000015) [ 2243.691149][ T2341] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2243.748824][ T2341] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2243.801518][ T2360] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2243.810715][ T2341] EXT4-fs (loop2): get root inode failed [ 2243.816498][ T2360] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200016b008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2243.858179][ T2360] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2243.877337][ T2360] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2243.905966][ T2341] EXT4-fs (loop2): mount failed 15:35:34 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 15:35:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2244.115900][ T2370] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2244.144523][ T2370] EXT4-fs (loop0): Invalid log cluster size: 1795227650 15:35:35 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000008000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2244.225777][ T2380] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2244.285595][ T2380] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2244.312617][ T2383] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:35 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket(0x10, 0x2, 0x0) dup3(r1, r0, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 2244.391660][ T2383] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2244.401957][ T2383] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2244.420837][ T2383] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$netlink(r0, &(0x7f00000003c0)=@unspec, 0xc) 15:35:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200006c008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2244.443485][ T2383] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2244.477920][ T2380] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2244.536030][ T2380] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2244.554143][ T2393] EXT4-fs (loop0): Test dummy encryption mode enabled 15:35:35 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000700)='/dev/urandom\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 15:35:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x5451, 0x0) [ 2244.600224][ T2383] EXT4-fs (loop2): get root inode failed [ 2244.613953][ T2393] EXT4-fs (loop0): Invalid log cluster size: 1811939330 15:35:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2040000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2244.657382][ T2383] EXT4-fs (loop2): mount failed 15:35:35 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000009000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x169001, 0x0) write$P9_RLERROR(r0, 0x0, 0x0) 15:35:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000074008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x3000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:35 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x24008080) 15:35:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, 0x0, 0x0) [ 2244.927321][ T2415] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2244.934769][ T2419] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2244.955380][ T2415] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2244.971582][ T2419] EXT4-fs (loop0): Invalid log cluster size: 1946157058 [ 2244.979827][ T2414] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2244.987036][ T2414] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2244.997225][ T2414] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2245.007617][ T2414] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000075008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001e40)={0x0}}, 0x0) [ 2245.045802][ T2414] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2245.059448][ T2414] EXT4-fs (loop2): get root inode failed [ 2245.079365][ T2414] EXT4-fs (loop2): mount failed 15:35:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) [ 2245.210855][ T2415] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2245.221024][ T2415] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2245.226182][ T2426] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000002c0)='G', 0x1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) r1 = dup(r0) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = gettid() recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x40003a0, 0x0, 0x0) tkill(r2, 0x14) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 15:35:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x4000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2245.278833][ T2426] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2245.288721][ T2426] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2245.298700][ T2426] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2245.310588][ T2426] EXT4-fs: failed to create workqueue [ 2245.316543][ T2426] EXT4-fs (loop2): mount failed [ 2245.321929][ T2446] EXT4-fs (loop0): Test dummy encryption mode enabled 15:35:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) [ 2245.352228][ T2446] EXT4-fs (loop0): Invalid log cluster size: 1962934274 15:35:36 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000a000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x11, 0x0, &(0x7f00000001c0)) 15:35:36 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x50040, 0x4) 15:35:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200007a008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2245.593665][ T2462] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2245.600593][ T2462] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCSIFBR(r0, 0x5452, &(0x7f0000000080)=@add_del={0x2, 0x0}) 15:35:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 2245.641623][ T2472] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2245.649128][ T2472] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2245.660562][ T2472] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 15:35:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000340)) 15:35:36 executing program 1: r0 = timerfd_create(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 2245.685281][ T2472] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2245.746203][ T2478] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2245.754955][ T2472] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2245.779554][ T2478] EXT4-fs (loop0): Invalid log cluster size: 2046820354 15:35:36 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KDSKBENT(r0, 0x4b4a, &(0x7f0000000140)) [ 2245.802419][ T2462] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2245.809616][ T2462] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2245.837556][ T2472] EXT4-fs (loop2): get root inode failed 15:35:36 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x200000000001, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = dup3(r1, r0, 0x0) r3 = accept4$packet(r2, 0x0, 0x0, 0x0) ioctl$int_out(r3, 0x2, &(0x7f00000002c0)) [ 2245.858927][ T2472] EXT4-fs (loop2): mount failed 15:35:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x5000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) dup3(r0, r1, 0x0) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={0x0}}, 0x0) [ 2246.069686][ T2482] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2246.079019][ T2482] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2246.090526][ T2482] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2246.102338][ T2482] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2246.123615][ T2482] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2246.136087][ T2482] EXT4-fs (loop2): get root inode failed [ 2246.141729][ T2482] EXT4-fs (loop2): mount failed [ 2246.148486][ T2507] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2246.171475][ T2507] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:37 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000b000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:37 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000000)) 15:35:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200007e008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x434, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x5450) 15:35:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x6000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:37 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 2246.308209][ T2520] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2246.316754][ T2520] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2246.335113][ T2520] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2246.335746][ T2516] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2246.353078][ T2520] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2246.360253][ T2526] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2246.371062][ T2526] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2246.371639][ T2520] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated 15:35:37 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) r1 = dup(r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000080)={&(0x7f0000000040), 0x34, &(0x7f0000000000)={0x0}}, 0x0) 15:35:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, &(0x7f0000000240)={&(0x7f0000000000), 0x4b, &(0x7f0000000100)={&(0x7f00000001c0)={0x60, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6}, @NL80211_ATTR_CRIT_PROT_ID={0x6}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6}, @NL80211_ATTR_CRIT_PROT_ID={0x6}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6}]}, 0x60}}, 0x0) close(r0) socket(0x40000000002, 0x3, 0x2) tkill(r2, 0x1000000000016) [ 2246.408655][ T2516] EXT4-fs (loop0): Invalid log cluster size: 2113929218 [ 2246.435433][ T2526] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2246.445480][ T2526] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:37 executing program 5: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) [ 2246.464714][ T2520] EXT4-fs (loop2): get root inode failed [ 2246.494291][ T2520] EXT4-fs (loop2): mount failed 15:35:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000089008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x6040000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:37 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000c000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:37 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r3 = ioctl$TUNGETDEVNETNS(r2, 0x5450, 0x0) dup2(r0, r3) sendmsg$TIPC_NL_KEY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) [ 2246.597938][ T2550] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2246.613076][ T2550] EXT4-fs (loop0): Invalid log cluster size: 2298478594 [ 2246.620451][ T2546] raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! 15:35:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r2, 0x8030942b, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 15:35:37 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r3 = ioctl$TUNGETDEVNETNS(r2, 0x5450, 0x0) dup2(r0, r3) sendmsg$TIPC_NL_KEY_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 15:35:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000294008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2246.754770][ T2561] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2246.766374][ T2561] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2246.779915][ T2561] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2246.832847][ T2577] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2246.839812][ T2577] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2246.877955][ T2561] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2246.899931][ T2581] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2246.907928][ T2577] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2246.918367][ T2577] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) setsockopt$inet6_mreq(r1, 0x29, 0x1b, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8982, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 2246.925267][ T2581] EXT4-fs (loop0): Invalid log cluster size: 2483159042 15:35:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x8000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2246.961242][ T2561] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2246.993492][ T2561] EXT4-fs (loop2): get root inode failed [ 2247.000089][ T2561] EXT4-fs (loop2): mount failed 15:35:37 executing program 1: r0 = socket(0xa, 0x1, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x14004810) 15:35:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000295008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2247.095161][ T2597] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2247.136797][ T2597] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2247.150773][ T2599] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2247.167527][ T2599] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f00000000c0)='./file1\x00', 0x42, 0x0) dup2(r0, r1) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x38, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) [ 2247.211890][ T2599] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2247.228787][ T2599] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2247.239412][ T2599] EXT4-fs: failed to create workqueue [ 2247.246852][ T2599] EXT4-fs (loop2): mount failed 15:35:38 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000d000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2247.261896][ T2607] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2247.277600][ T2607] EXT4-fs (loop0): Invalid log cluster size: 2499936258 [ 2247.282928][ T2597] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2247.294060][ T2597] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:38 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000003d00)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, 0x0, 0x0) 15:35:38 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f0000001800)="2ba909eeb10f4c882f24d108173724e580221dd4", 0x14) 15:35:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x9000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000296008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:38 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) [ 2247.519589][ T2627] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2247.545697][ T2627] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:38 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x0) 15:35:38 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x0, 0x0) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$LOOP_SET_FD(r0, 0x5450, r1) [ 2247.670455][ T2634] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2247.683206][ T2627] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2247.701537][ T2634] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2247.705374][ T2627] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:38 executing program 1: r0 = inotify_init1(0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 2247.718606][ T2638] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2247.719604][ T2627] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2247.737609][ T2627] EXT4-fs (loop2): get root inode failed [ 2247.744564][ T2627] EXT4-fs (loop2): mount failed 15:35:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0, 0x0, 0x0, 0x190}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) dup3(r0, r1, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 15:35:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xa000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:38 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000e000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2247.794601][ T2638] EXT4-fs (loop0): Invalid log cluster size: 2516713474 15:35:38 executing program 1: sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}]}]}, 0x38}}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890c, &(0x7f0000000040)) 15:35:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000bb008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2247.925548][ T2654] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2247.936800][ T2654] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2247.945348][ T2661] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001080)='/dev/net/tun\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) [ 2247.983350][ T2661] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000100)=0x80) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000001c0)) [ 2248.026624][ T2654] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2248.036898][ T2668] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2248.040964][ T2661] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2248.059441][ T2654] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2248.079360][ T2668] EXT4-fs (loop0): Invalid log cluster size: 3137339394 [ 2248.118657][ T2661] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) 15:35:39 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:35:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xb000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2248.138797][ T2661] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2248.186461][ T2661] EXT4-fs (loop2): get root inode failed [ 2248.197319][ T2661] EXT4-fs (loop2): mount failed 15:35:39 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8441, 0x0) ioctl$BLKREPORTZONE(r0, 0x5450, 0x0) 15:35:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000bc008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2248.324143][ T2674] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2248.348701][ T2674] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2248.364179][ T2694] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2248.380880][ T2694] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2248.381412][ T2674] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 15:35:39 executing program 1: pipe2(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(r0, 0x0, 0x0) [ 2248.440161][ T2694] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2248.450324][ T2698] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2248.468606][ T2694] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2248.488487][ T2698] EXT4-fs (loop0): Invalid log cluster size: 3154116610 15:35:39 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) syncfs(r0) [ 2248.513063][ T2674] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2248.524101][ T2674] EXT4-fs: failed to create workqueue [ 2248.529686][ T2674] EXT4-fs (loop2): mount failed 15:35:39 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000f000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xc000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000bd008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 2248.817289][ T2717] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2248.826234][ T2714] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2248.866605][ T2717] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2248.887788][ T2714] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2248.907872][ T2727] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2248.931545][ T2727] EXT4-fs (loop0): Invalid log cluster size: 3170893826 [ 2248.964511][ T2714] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2248.976235][ T2714] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x20000000) [ 2249.023618][ T2714] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2249.063596][ T2717] EXT4-fs (loop3): Test dummy encryption mode enabled 15:35:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 15:35:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020026d1008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2249.070501][ T2717] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2249.082196][ T2714] EXT4-fs (loop2): get root inode failed [ 2249.121736][ T2714] EXT4-fs (loop2): mount failed 15:35:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_PMKSA(r0, 0x0, 0x0) 15:35:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xd000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') 15:35:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$binfmt_elf64(r0, &(0x7f0000001140)=ANY=[], 0x6c1) r2 = dup(r0) sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x268}}, 0x0) [ 2249.283652][ T2744] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2249.285268][ T2747] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2249.290866][ T2723] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2249.316830][ T2744] EXT4-fs (loop0): Invalid log cluster size: 3508928514 15:35:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 2249.336751][ T2723] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2249.346500][ T2747] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2249.353789][ T2723] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2249.363939][ T2723] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2249.374083][ T2723] EXT4-fs: failed to create workqueue [ 2249.379611][ T2723] EXT4-fs (loop2): mount failed 15:35:40 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000010000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:40 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) accept4$unix(r1, 0x0, &(0x7f00000001c0), 0x80800) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 15:35:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup2(r0, r1) sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:35:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020003f7008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2249.541344][ T2747] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2249.548307][ T2747] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$unix(0x1, 0x5, 0x0) tkill(r2, 0x1000000000016) 15:35:40 executing program 5: r0 = socket(0x2, 0x3, 0x24d) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)) 15:35:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xe000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2249.635325][ T2773] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2249.651572][ T2773] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2249.696277][ T2773] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2249.706145][ T2773] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2249.728936][ T2773] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated 15:35:40 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$inet(r0, 0x0, &(0x7f0000000040)) [ 2249.753415][ T2773] EXT4-fs (loop2): get root inode failed [ 2249.761464][ T2773] EXT4-fs (loop2): mount failed [ 2249.773825][ T2782] EXT4-fs (loop0): Test dummy encryption mode enabled 15:35:40 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000011000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2249.846389][ T2782] EXT4-fs (loop0): Invalid log cluster size: 4144168962 15:35:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$KDSETLED(r1, 0x5409, 0x0) 15:35:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) connect$unix(r1, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) [ 2249.983088][ T2800] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2249.990208][ T2800] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020001f8008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2250.031398][ T2802] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2250.047199][ T2802] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:41 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000700)='/dev/urandom\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2250.091882][ T2802] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2250.115331][ T2800] EXT4-fs (loop3): Test dummy encryption mode enabled 15:35:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r0, r1) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, 0x0, &(0x7f0000001040)) [ 2250.136000][ T2800] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2250.148243][ T2802] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2250.158411][ T2802] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2250.241898][ T2823] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2250.248697][ T2823] EXT4-fs (loop0): Invalid log cluster size: 4160815106 15:35:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000240)={0x77359400}, 0x10) r2 = gettid() sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x15) 15:35:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xf000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2250.299335][ T2802] EXT4-fs (loop2): get root inode failed [ 2250.351466][ T2802] EXT4-fs (loop2): mount failed 15:35:41 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) 15:35:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020003f8008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:41 executing program 5: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self\x00', 0x0, 0x0) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) [ 2250.430792][ T2840] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2250.440989][ T2809] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2250.449041][ T2840] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$binfmt_elf64(r0, &(0x7f0000001140)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000063425eb30df56b2641a406cb47dc7115c139c8c1160367e6c1868736eb3016abbe545273a63322d9068f0c1e1fa45ee2efd86ece2e880053297b530cea79a25045eca08514e22edfdaceab03d33bc6a122ee86c4ffabb75f076f9c10647f34724f556af3762e23120626d69b08db10a64b95bad9c51a5e8b85dc7cec75723f0899073fb8e8619d170285099efd88077b2d53938f644dd50958ad3d820bf5796e976fae2d8b311a1591732efe184767a1c312ff51acb68a096b70e6bade64d0396f5e1d78f5aa86a926570c2f339150088bf2ecabab86548bf2ae3261fb291284e99917eae0316505575cfb85f5fe28fc53b09f6182ffd708259ef5f8a7738ffeb2522cb188055b1fe82bbcdaec8f68f94271a48a62d77a6ac158004637da609ec6f699a8c0bbf6d7cbde2e38ea05474e8418412996d3da008e8aa60d0497b499d9091b579021110c803cf56d55d842e1a4be994f20187c260de2f0f4ad1a55783b0a0e0239697fc748b168a0ecfa6394dac55fb0daca7804a3872bd88295637b9963a1b94de9e8a353fdfbfebeb686cef2814b442e68ad3f6ce15536ee54ddfb5072339cf0f62e83cfa5d6cf16681e933818ce3a27a6122330034b5f27904d5884b60dc49dbdf3e1d35030e10000e62be7f4dc2c57ff93646f6156997ee00cc0ece6ada7db5111c5aa92c29dc225b0e8a269173178f02e85fb608280c1de3dfaa4b4d7b468abc2c13a6f3af7800255ec0195ff4ab55e5cc1911bac6376b3a26341ada9df75c253e88de059c9b512045d0e5cada731da93f3e82b8cc0265500074666bf719f20cf12695dd6d5c720f597025038fc8d421d8ad466d5930b801da6230371a7448c3fbdcb13ad37d01f2f16b204cc2506a14f414ed0e753d002a521e82c3806e3fca37e94afa64b7de07852530731cf414d3d111fa70ae6776007ccba920660275d48880d18e52972b5f6ffead7363248a75636f36cb63b4f4ada6ee8a30c44684bb81949079e533b383699ee3f8fd3defc4979be503ca6534008803226acc48df51696ea79ff5422855c3a13807611f5b05a6973e714cd923c9448585197a2629306c0f8295e9bc8297f000da405836bf3b52e322129185c513cc44b1e0df4f43c0783199d4be0f4c6bc2e562d585465c94d4596bf4254f2c896edf725468dd897dfea50e3b082bf4f5254b7e5c741717628f4b15f567e48571ea8e92f01c001e96205b69140c22273795f18c88dd47ebff70115cc5ae51230bdf60d4bad8de0fd781b207c09d2591851293a2956cfd9bdfd32083abdaae3317a515b6f5fc2f1535abe4d14145fbeba42ac8a54e12679a383556afd0c9243c72e310af9da709bc86f9fe75b0da235b2dfb4334754e60ee04f5ba075df20e99eb3d0fc8ff8ddbdc69f9c77ba4efb5cd90ffa017e6bdb2d3b34837740afeda8ff81adac461d670824342a0f4ab72a35b1cfcc61268bbe4975b637c34489862b168104b71a68a3415ed5887f63022a18427c23b8274b65f388a077e47037c9c10186a91403d534a5778ff7d8595d0479a3b039570e57bf7e071cda4ad2647260fc4af7098f9a30ed33386363eb57d6819d44203de879b71f5dabf32163f4b676c5d6bb0dc1a70296d2a884e16f9510f7168ecb53baf3de6773f06146ad3d2f275a1f988ff99bf6efa8d0668fde1085cbd9c87ca1946bec040edd2f2423a81fdfdc6165affcfb26b3b8614f691835dcb173dde036d61ee012eb09bd6fcfafdda5dad4c7e16c4e37e2b25ee30b46c05d0161f007d82e5f3a2bfbd7bf4381a0c65c63a6ca8d07df933875c3429b5d6921a39eff6b84e378650e5e5a2896090000000f1fb8706d6bf309018eff3e6197c4be61af704346ed469f8ad893d8bc09566b21c3af4a65ecd95b0a1e8bf0e3c45a4f1e3c9a298b14cae400e002dfec26ef410deb088aeeb1ba5285c71404a96d2c9be0fc579b0e130524a3626a848d04b328bd628f3e4bdc6ef327e0c5916c44e97d32f32ce866160dcce4183e4423c387d88d0485f19947cc76475e4045f72ffc7f7aaed77d573b0c6d189c82c6e65d58ddea81b1aca3556dd6661494c064e6cb93593b792e3cd07ae5aaba771bc4fd470d6f6aea2ce463ffde8a072a3a78a108f5f7030ef1383c27f5e0e4661ec8f1a38e7bb34c7737f0518d85b925d357e15f819f0f301e6f2e5936bccb2e3fa7efade9d1d009645f53142d7dfd4283a368bab954c45300c4547ad3595c2e751e8281627231ab003c24ab0d3f274f4e"], 0x6c1) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) [ 2250.475780][ T2809] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2250.492681][ T2851] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2250.510651][ T2809] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2250.539065][ T2851] EXT4-fs (loop0): Invalid log cluster size: 4160946178 [ 2250.546325][ T2809] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2250.557085][ T2809] EXT4-fs: failed to create workqueue [ 2250.565681][ T2809] EXT4-fs (loop2): mount failed 15:35:41 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000012000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:41 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockname$inet6(r0, 0x0, &(0x7f0000000040)) 15:35:41 executing program 1: r0 = inotify_init() close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000100)={0x0, @rand_addr, @initdev}, &(0x7f0000000000)=0xc) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 2250.636128][ T2840] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2250.649356][ T2840] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020003f9008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x10000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) read$char_raw(r1, &(0x7f0000000400)={""/19390}, 0x4c00) [ 2250.720608][ T2868] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2250.733687][ T2868] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2250.834759][ T2868] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2250.846529][ T2879] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2250.856472][ T2879] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2250.862660][ T2878] EXT4-fs (loop0): Test dummy encryption mode enabled 15:35:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x10040000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2250.912697][ T2878] EXT4-fs (loop0): Invalid log cluster size: 4177723394 [ 2250.931447][ T2868] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2250.993974][ T2868] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated 15:35:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000fff008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2251.072917][ T2868] EXT4-fs (loop2): get root inode failed [ 2251.104542][ T2868] EXT4-fs (loop2): mount failed 15:35:42 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000004c00)={0x0, 0x0, &(0x7f0000004bc0)={0x0}}, 0x0) 15:35:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x11000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2251.132636][ T2895] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2251.143831][ T2895] EXT4-fs (loop0): Invalid log cluster size: 4279173122 15:35:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000002008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2251.294574][ T2875] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2251.296343][ T2902] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2251.345838][ T2875] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2251.359268][ T2909] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2251.366065][ T2902] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2251.375172][ T2909] EXT4-fs (loop0): Invalid log cluster size: 33554434 15:35:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000005040)={0x0, 0x0, &(0x7f0000005000)={0x0}}, 0x0) [ 2251.391508][ T2875] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2251.401359][ T2875] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2251.429804][ T2875] EXT4-fs: failed to create workqueue [ 2251.451000][ T2875] EXT4-fs (loop2): mount failed 15:35:42 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000014000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:42 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r0, 0xb) 15:35:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000003008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x12000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2251.505749][ T2902] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2251.512676][ T2902] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) close(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 15:35:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 15:35:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x8000) [ 2251.642475][ T2926] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2251.650645][ T2926] EXT4-fs (loop0): Invalid log cluster size: 50331650 [ 2251.674299][ T2934] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2251.686510][ T2931] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2251.715185][ T2934] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2251.729112][ T2934] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2251.740597][ T2931] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2251.747782][ T2934] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000004008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:42 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000100), 0x8) [ 2251.770907][ T2934] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2251.783140][ T2934] EXT4-fs (loop2): get root inode failed [ 2251.788766][ T2934] EXT4-fs (loop2): mount failed 15:35:42 executing program 1: select(0xb, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 2251.820872][ T2941] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2251.828473][ T2941] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2251.838487][ T2941] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2251.849829][ T2941] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2251.866317][ T2941] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2251.878660][ T2941] EXT4-fs (loop2): get root inode failed [ 2251.887197][ T2941] EXT4-fs (loop2): mount failed 15:35:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendto$packet(r1, &(0x7f0000000000)="c0", 0x1, 0x4c010, 0x0, 0x0) 15:35:42 executing program 5: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ff8000/0x1000)=nil) shmat(r0, &(0x7f0000ff3000/0xd000)=nil, 0x7000) [ 2251.938247][ T2954] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2251.945556][ T2954] EXT4-fs (loop0): Invalid log cluster size: 67108866 [ 2251.945868][ T2931] EXT4-fs (loop3): Test dummy encryption mode enabled 15:35:42 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00001b000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) dup3(r0, r1, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0xb, 0x0, 0x0) 15:35:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000005008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2251.992285][ T2931] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x20000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:43 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 15:35:43 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs(r1, &(0x7f0000000000)='net/route\x00') 15:35:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) dup2(r0, r1) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) 15:35:43 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000004300)={0x0}}, 0x0) [ 2252.178626][ T2978] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2252.187115][ T2979] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2252.230731][ T2979] EXT4-fs (loop0): Invalid log cluster size: 83886082 [ 2252.254139][ T2978] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2252.266959][ T2989] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2252.274585][ T2989] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:43 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x5450, 0x0) 15:35:43 executing program 1: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8901, &(0x7f0000000000)={0x3, 'caif0\x00'}) [ 2252.281207][ T2978] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2252.316880][ T2978] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000006008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$binfmt_elf64(r0, &(0x7f0000001140)=ANY=[], 0x6c1) r2 = dup(r0) sendmsg$NL80211_CMD_DEL_MPATH(r2, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) [ 2252.414594][ T2978] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2252.433080][ T2989] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2252.445144][ T2989] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2252.476712][ T2978] EXT4-fs (loop2): get root inode failed [ 2252.482910][ T2978] EXT4-fs (loop2): mount failed [ 2252.491230][ T3010] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2252.512059][ T3010] EXT4-fs (loop0): Invalid log cluster size: 100663298 15:35:43 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00001c000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x5452, &(0x7f0000000100)={0x0, 0x0}) 15:35:43 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000004c0)=ANY=[], 0x5c4}}, 0x0) 15:35:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x20100000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:43 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) accept4$unix(r2, 0x0, &(0x7f0000000140)=0x1d, 0x0) 15:35:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000007008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2252.666076][ T3032] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2252.677609][ T3032] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:43 executing program 1: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, 0x0, &(0x7f0000000980)) [ 2252.706493][ T3032] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2252.727470][ T3032] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0xfffffffffffffd5f, 0x15, &(0x7f0000000040)={0xa, 0x4e1a, 0x0, @empty}, 0x1c) [ 2252.746859][ T3032] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated 15:35:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x21000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:43 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) [ 2252.792454][ T3032] EXT4-fs (loop2): get root inode failed [ 2252.803190][ T3045] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2252.810038][ T3045] EXT4-fs (loop0): Invalid log cluster size: 117440514 [ 2252.812821][ T3032] EXT4-fs (loop2): mount failed 15:35:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) fcntl$addseals(r1, 0x2, 0x0) [ 2252.877322][ T3063] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2252.884559][ T3063] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2252.884816][ T3032] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89f0, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast2}}) [ 2252.951735][ T3032] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2252.984285][ T3063] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2253.018346][ T3032] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2253.028154][ T3063] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2253.050630][ T3032] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2253.064201][ T3032] EXT4-fs: failed to create workqueue [ 2253.074939][ T3032] EXT4-fs (loop2): mount failed 15:35:44 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00001e000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000008008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:44 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0xfffffff9) 15:35:44 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00') ioctl$TIOCL_BLANKSCREEN(r0, 0x4b64, &(0x7f0000000000)) 15:35:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x22000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:44 executing program 5: r0 = socket(0x11, 0xa, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) [ 2253.219196][ T3092] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2253.232228][ T3089] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2253.240188][ T3092] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x19) dup2(r1, r0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x7, 0x0, 0x0) [ 2253.270703][ T3097] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2253.278158][ T3097] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2253.282933][ T3089] EXT4-fs (loop0): Invalid log cluster size: 134217730 [ 2253.289538][ T3097] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2253.309269][ T3097] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2253.332712][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2253.348126][ T3097] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2253.360663][ T3097] EXT4-fs (loop2): get root inode failed [ 2253.368596][ T3097] EXT4-fs (loop2): mount failed 15:35:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={0x0}}, 0x0) [ 2253.375223][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:35:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40001) 15:35:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000009008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:44 executing program 5: r0 = eventfd(0x0) close(r0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@dev, @local}, 0x8) [ 2253.524449][ T3092] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2253.545634][ T3108] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2253.554696][ T3092] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2253.554927][ T3108] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r1, &(0x7f0000000300)="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", 0x6c1, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) [ 2253.593458][ T3121] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2253.601123][ T3121] EXT4-fs (loop0): Invalid log cluster size: 150994946 [ 2253.640134][ T3108] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2253.651783][ T3108] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2253.665559][ T3108] EXT4-fs: failed to create workqueue [ 2253.671006][ T3108] EXT4-fs (loop2): mount failed 15:35:44 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000021000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:44 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0x5451, 0x0) 15:35:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000a008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x23000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) getsockopt$inet_int(r0, 0x0, 0xd, 0x0, &(0x7f0000000080)) 15:35:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80) write$cgroup_type(r1, 0x0, 0x0) 15:35:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) sendmmsg$inet6(r1, &(0x7f0000008b00)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c, 0x0}}], 0x1, 0x20000050) 15:35:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 2253.865778][ T3135] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2253.877046][ T3135] EXT4-fs (loop0): Invalid log cluster size: 167772162 15:35:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000b008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2253.955530][ T3148] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2253.963868][ T3150] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2253.974025][ T3148] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2253.991216][ T3150] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2254.035603][ T3150] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2254.060122][ T3148] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2254.074070][ T3148] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) write$nbd(r0, 0x0, 0x0) 15:35:45 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, 0x0) [ 2254.080980][ T3164] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2254.103213][ T3150] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2254.113217][ T3164] EXT4-fs (loop0): Invalid log cluster size: 184549378 15:35:45 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x74}}, 0x0) [ 2254.181407][ T3150] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2254.257716][ T3150] EXT4-fs (loop2): get root inode failed [ 2254.297845][ T3150] EXT4-fs (loop2): mount failed [ 2254.425413][ T3161] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2254.447552][ T3161] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2254.470128][ T3161] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2254.526032][ T3161] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2254.568929][ T3161] EXT4-fs: failed to create workqueue [ 2254.610181][ T3161] EXT4-fs (loop2): mount failed 15:35:45 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000022000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x24000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)}) ioctl$PIO_SCRNMAP(r0, 0x4b44, &(0x7f0000000080)) 15:35:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000c008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) close(r1) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(0xffffffffffffffff) r3 = socket(0xa, 0x3, 0x1f) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) tkill(r2, 0x1000000000016) [ 2254.769753][ T3192] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2254.777094][ T3191] EXT4-fs (loop0): Test dummy encryption mode enabled 15:35:45 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101001, 0x0) write$P9_ROPEN(r0, 0x0, 0x29) [ 2254.777108][ T3191] EXT4-fs (loop0): Invalid log cluster size: 201326594 [ 2254.785226][ T3192] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000d008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) capset(&(0x7f00002d0ff8)={0x20080522}, &(0x7f0000000000)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0/../file0/file0\x00', 0x0, 0x0, 0x0, 0x0) [ 2254.885087][ T3205] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2254.910739][ T3205] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2254.915754][ T3192] EXT4-fs (loop3): Test dummy encryption mode enabled 15:35:45 executing program 5: r0 = socket(0x11, 0x3, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) [ 2254.936384][ T3192] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2254.952431][ T3205] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2254.962255][ T3205] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x25000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2255.014724][ T3205] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2255.035713][ T3222] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2255.051356][ T3205] EXT4-fs (loop2): get root inode failed [ 2255.057034][ T3205] EXT4-fs (loop2): mount failed [ 2255.062863][ T3222] EXT4-fs (loop0): Invalid log cluster size: 218103810 15:35:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r2, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) dup3(r0, r3, 0x0) accept4$inet(r3, 0x0, 0x0, 0x0) 15:35:46 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) write$P9_RLERRORu(r0, 0x0, 0x0) [ 2255.183415][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2255.203182][ T3232] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2255.209476][ T3215] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2255.217077][ T3232] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2255.229876][ T3215] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2255.274918][ T3232] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2255.283977][ T3232] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2255.303216][ T3215] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2255.336906][ T3215] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2255.374358][ T3215] EXT4-fs: failed to create workqueue [ 2255.388051][ T3215] EXT4-fs (loop2): mount failed 15:35:46 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000025000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000e008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:46 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept$inet(r1, 0x0, 0x0) shutdown(r2, 0x0) 15:35:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2e000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$NL80211_CMD_GET_SURVEY(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r2, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) r5 = gettid() tkill(r5, 0x1000000000016) 15:35:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKGETSIZE(r1, 0x1260, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 2255.581784][ T3254] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2255.588980][ T3252] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2255.602434][ T3254] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2255.621258][ T3252] EXT4-fs (loop0): Invalid log cluster size: 234881026 15:35:46 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 2255.640179][ T3262] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2255.665367][ T3262] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2255.711657][ T3262] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 15:35:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200000f008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2255.755766][ T3254] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2255.770303][ T3254] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2255.787003][ T3262] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2255.818373][ T3262] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated 15:35:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x5421, &(0x7f0000000000)) 15:35:46 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000003f80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) flistxattr(r0, 0x0, 0x0) [ 2255.916294][ T3262] EXT4-fs (loop2): get root inode failed 15:35:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x3f000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2255.963858][ T3262] EXT4-fs (loop2): mount failed 15:35:46 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f00000009c0)) [ 2255.998595][ T3284] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2256.010957][ T3284] EXT4-fs (loop0): Invalid log cluster size: 251658242 [ 2256.059880][ T3279] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2256.075886][ T3279] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2256.128033][ T3279] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2256.183046][ T3279] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2256.199001][ T3300] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2256.203360][ T3279] EXT4-fs: failed to create workqueue [ 2256.215650][ T3300] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2256.221724][ T3279] EXT4-fs (loop2): mount failed 15:35:47 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 15:35:47 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000027000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000010008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000001fc0)='./file0\x00', 0x40, 0x0) close(r0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)) 15:35:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x52, 0x12222, 0x0, 0x0) [ 2256.388307][ T3310] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2256.389138][ T3300] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2256.408389][ T3310] EXT4-fs (loop0): Invalid log cluster size: 268435458 15:35:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) dup3(r1, r2, 0x0) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000040)) [ 2256.461213][ T3300] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@hopopts={0x0, 0x1, [], [@jumbo, @ra]}, 0x18) write(r0, 0x0, 0x0) r1 = dup(r0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:35:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x40000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000011008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2256.538400][ T3324] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2256.547894][ T3324] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2256.562934][ T3324] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2256.575557][ T3324] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) write$P9_RSTAT(r0, 0x0, 0x0) [ 2256.602258][ T3324] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2256.625890][ T3324] EXT4-fs (loop2): get root inode failed [ 2256.637537][ T3324] EXT4-fs (loop2): mount failed [ 2256.700124][ T3344] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2256.709607][ T3332] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2256.718371][ T3344] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000200)={&(0x7f0000000140), 0xfe55, &(0x7f0000000000)={0x0}}, 0x0) 15:35:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "87a082dd2d670576dc7e1e3dcd692ed4766cd7"}) [ 2256.744322][ T3332] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2256.760979][ T3332] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2256.775233][ T3350] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2256.788705][ T3344] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2256.789290][ T3350] EXT4-fs (loop0): Invalid log cluster size: 285212674 [ 2256.804672][ T3332] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2256.815956][ T3332] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2256.831477][ T3332] EXT4-fs (loop2): get root inode failed [ 2256.837338][ T3332] EXT4-fs (loop2): mount failed 15:35:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000012008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2256.853339][ T3344] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:47 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00002e000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:47 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 15:35:47 executing program 1: r0 = socket(0x10, 0x2, 0x2) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:35:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x40000800, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:47 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x6, 0x0, 0x0) 15:35:47 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) utimensat(r0, 0x0, &(0x7f0000000100), 0x0) [ 2257.024240][ T3368] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2257.038386][ T3374] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2257.047404][ T3374] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2257.055913][ T3368] EXT4-fs (loop0): Invalid log cluster size: 301989890 15:35:48 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 15:35:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000500)) r2 = dup2(r0, r0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xfffffe86}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r2) socket$inet_udplite(0x2, 0x2, 0x88) tkill(r1, 0x1000000000016) [ 2257.084127][ T3382] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2257.091133][ T3374] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2257.107718][ T3382] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2257.118896][ T3374] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:48 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) [ 2257.184755][ T3374] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated 15:35:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000013008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2257.251849][ T3382] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2257.261471][ T3382] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x48000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000040)={0x0, &(0x7f00000003c0)=""/146}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000390400"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3c}}, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x2, 0x4200) r1 = socket$unix(0x1, 0x2, 0x0) r2 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000057f00)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000058f00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000059100)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005a100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r6}], 0x1f, "0564f8624681bc"}) ioctl$BLKALIGNOFF(r3, 0x127a, &(0x7f0000000280)) r7 = socket$unix(0x1, 0x2, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x4001ff) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f0000000180)={0x7, @raw_data="41de74b87abce25ae26007a4d21f9542e5fc3c8bdd4a4c45472fd992138f467b5495fc12861a7485a968c53747e2ed8abe1b8fbbfec1095d21d49495c48212c09c750e0bd8fa9ef242578c62103fcdf6929b6034cd5499656ab8f3094a92d6a8e66930b3fae45e5babb89a0f597a991f045404353f60d732506497585223d81599708608fae05d22141a0272db0cf49248a2c8d85bf7f836436a558f5e567c8759ce69685cc7d394a84a7c3ad53a6a30de81fe3777f7ebc1f5cae2ff4f1cac93cd1c833f7b733410"}) clock_getres(0x0, &(0x7f0000000340)) [ 2257.341257][ T3374] EXT4-fs (loop2): get root inode failed [ 2257.353946][ T3374] EXT4-fs (loop2): mount failed [ 2257.364594][ T3400] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2257.398940][ T3400] EXT4-fs (loop0): Invalid log cluster size: 318767106 [ 2257.479833][ T3386] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2257.487364][ T3386] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2257.492539][ T3406] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2257.497510][ T3386] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2257.514002][ T3386] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2257.526976][ T3386] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2257.539550][ T3386] EXT4-fs (loop2): get root inode failed [ 2257.545395][ T3386] EXT4-fs (loop2): mount failed 15:35:48 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000048000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, 0x0, 0x0) 15:35:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000014008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x538) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r2, r3) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0xf, 0x0, &(0x7f0000000100)) 15:35:48 executing program 4: sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x42c, 0x3f4, 0x100, 0x70bd29, 0x25dfdbfe, {0x6, 0x1, 0x2b, [0x81, 0x4, 0x3, 0x1e, 0x60b, 0x7fffffff, 0x2, 0x343b, 0xffffffff, 0xe6, 0x9, 0x4, 0x6, 0x8, 0x9, 0x6, 0x9, 0x8, 0x0, 0x2, 0x400, 0xffffffff, 0x95f1, 0x1, 0x5, 0x3, 0x3, 0x7, 0x7, 0x90, 0x9, 0x3ff, 0x7f, 0x4, 0x48f7, 0x0, 0x401, 0x0, 0x4c545170, 0x6, 0x9, 0x9, 0x9, 0xb596, 0x9, 0xa1fb, 0xffffffe1, 0x80000000, 0x6715, 0x8000, 0x1, 0x0, 0x3, 0x80000000, 0x6, 0xa3f, 0x800, 0xa, 0x1f, 0x8, 0x8, 0x0, 0x8, 0x744], [0x1, 0x34d2, 0xfffffff7, 0x8001, 0x80000001, 0x2, 0xd60, 0x3, 0x1000, 0x9, 0x4, 0x3, 0xfffffff7, 0x3f, 0x200, 0x6, 0xdc, 0x3, 0x8, 0x3, 0x6, 0x80000000, 0xbaf, 0x56c8f833, 0x26, 0x4, 0x7, 0xfbee, 0x8000, 0x80000001, 0x6, 0x15df, 0x0, 0xbde, 0x4, 0x8, 0x3, 0x3, 0x80000000, 0x4d, 0x9, 0xffffffcb, 0x9, 0x7, 0x10001, 0x2, 0xe30, 0x3, 0x10000, 0x8000, 0x5, 0x9, 0x4, 0x20, 0x8, 0x4, 0x40, 0x101, 0x1000, 0xd3, 0x7fffffff, 0x1000, 0x100, 0x1], [0x2, 0x8, 0x200, 0x75, 0xa23, 0x8d, 0x800, 0x0, 0x81, 0x10000, 0x1ff, 0x6, 0x1f, 0x0, 0x1d28, 0x7, 0x53, 0x20, 0x4, 0x7, 0x0, 0x5d4d, 0x6, 0x2, 0x8, 0x1, 0x401, 0x4, 0xffff, 0xa5d4, 0x40, 0x3f, 0x7fff, 0x500, 0x7, 0xffff, 0x1, 0x3, 0xb9c, 0x5, 0xf1, 0x2, 0x0, 0x9, 0x4, 0x3, 0x0, 0x4, 0x7fff, 0x1f, 0x81, 0x6, 0x0, 0x3a057bf, 0x81, 0x1, 0x4, 0xffc00000, 0xffffff00, 0x2, 0x0, 0xf044, 0xeeb6], [0x5, 0x2, 0x9, 0x3f, 0x1, 0x8, 0x0, 0x4, 0x10001, 0x0, 0xffff, 0x6, 0x1, 0x200, 0x7, 0x7f, 0x5, 0x1, 0x8001, 0x12, 0xfffffffa, 0x1, 0x1, 0x2, 0x4, 0x400, 0x4, 0x7fffffff, 0x5, 0x34aa0000, 0x7a9efb2c, 0x0, 0x80000000, 0x7, 0x20, 0x400, 0x8, 0xfffffff7, 0x4d0, 0x6, 0xffff, 0xece, 0x0, 0x8000, 0x401, 0x2, 0xa6, 0x6, 0x5, 0x0, 0x557e, 0x1e6, 0xfffffff8, 0x3f, 0x7, 0x0, 0xff, 0x200, 0x1f, 0x5, 0x6, 0x5, 0xfffffbff, 0x80000001], 0x9, ['%\x00', 'geneve\x00']}, [""]}, 0x42c}, 0x1, 0x0, 0x0, 0x4040081}, 0x40000) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5}]}}}]}, 0x3c}}, 0x0) 15:35:48 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5450, 0x0) [ 2257.616636][ T3406] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2257.705964][ T3424] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2257.714668][ T3406] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2257.729252][ T3406] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2257.753375][ T3424] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2257.797371][ T3435] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2257.831133][ T3424] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 15:35:48 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) dup2(r0, r1) write$binfmt_elf64(r1, 0x0, 0x0) [ 2257.841150][ T3424] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2257.853757][ T3435] EXT4-fs (loop0): Invalid log cluster size: 335544322 [ 2257.872375][ T3424] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2257.885582][ T3424] EXT4-fs (loop2): get root inode failed 15:35:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x4c000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001b008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2257.897837][ T3424] EXT4-fs (loop2): mount failed 15:35:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2c}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket(0x1, 0x5, 0x0) tkill(r2, 0x1000000000016) 15:35:48 executing program 1: r0 = timerfd_create(0x0, 0x0) fstatfs(r0, &(0x7f0000000040)=""/180) [ 2258.017390][ T3438] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2258.029342][ T3438] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2258.066306][ T3459] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2258.076447][ T3459] EXT4-fs (loop0): Invalid log cluster size: 452984834 [ 2258.080836][ T3465] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2258.090891][ T3465] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2258.094946][ T3438] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2258.128730][ T3438] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2258.140095][ T3438] EXT4-fs: failed to create workqueue [ 2258.149569][ T3438] EXT4-fs (loop2): mount failed [ 2258.160421][ T3465] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2258.168186][ T3465] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:49 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00004a000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x538) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r2, r3) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0xf, 0x0, &(0x7f0000000100)) 15:35:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) dup2(r0, r1) ioctl$TIOCNXCL(r1, 0x540d) 15:35:49 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept$unix(r1, 0x0, 0x0) write$evdev(r2, 0x0, 0x0) 15:35:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001c008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40) 15:35:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x5c000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:49 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x5451, 0x0) 15:35:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept$unix(r0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x1b5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[], 0x54}}, 0x0) [ 2258.384650][ T3485] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2258.409419][ T3485] EXT4-fs (loop0): Invalid log cluster size: 469762050 15:35:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001e008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2258.488942][ T3495] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2258.496124][ T3494] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2258.503227][ T3494] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2258.516370][ T3494] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2258.526738][ T3494] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x890c, &(0x7f0000000000)={'ip6_vti0\x00', 0x0}) [ 2258.557727][ T3494] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2258.571875][ T3494] EXT4-fs (loop2): get root inode failed [ 2258.577568][ T3494] EXT4-fs (loop2): mount failed [ 2258.584066][ T3495] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0x5451, 0x0) [ 2258.599554][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2258.684617][ T3515] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2258.693518][ T3515] EXT4-fs (loop0): Invalid log cluster size: 503316482 [ 2258.706056][ T3510] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2258.715202][ T3510] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2258.727294][ T3510] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2258.738744][ T3510] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2258.753884][ T3495] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2258.760790][ T3510] EXT4-fs: failed to create workqueue [ 2258.781021][ T3495] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2258.789119][ T3510] EXT4-fs (loop2): mount failed 15:35:49 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00004b000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:49 executing program 5: rt_sigaction(0x37, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000180)) 15:35:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = creat(&(0x7f0000000ac0)='./file0\x00', 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 15:35:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000021008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x60000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2259.062758][ T3540] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2259.069723][ T3540] EXT4-fs (loop0): Invalid log cluster size: 553648130 [ 2259.078146][ T3541] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2259.089385][ T3539] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2259.099574][ T3541] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2259.111914][ T3539] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2259.139310][ T3539] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2259.156485][ T3539] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2259.170061][ T3539] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2259.197974][ T3539] EXT4-fs (loop2): get root inode failed 15:35:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r0, r1) ioctl$TIOCL_SELLOADLUT(r1, 0x560d, &(0x7f0000000040)={0xb}) 15:35:50 executing program 5: rt_sigaction(0x37, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000180)) 15:35:50 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:35:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000022008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2259.210877][ T3539] EXT4-fs (loop2): mount failed 15:35:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) [ 2259.309825][ T3561] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2259.322855][ T3548] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2259.330037][ T3541] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2259.349288][ T3541] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:50 executing program 5: r0 = memfd_create(&(0x7f0000000000)=',\\!\x00', 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x0) [ 2259.350075][ T3548] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2259.374663][ T3561] EXT4-fs (loop0): Invalid log cluster size: 570425346 [ 2259.386350][ T3548] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2259.397736][ T3548] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, 0x0) [ 2259.410285][ T3548] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2259.423315][ T3548] EXT4-fs (loop2): get root inode failed [ 2259.429379][ T3548] EXT4-fs (loop2): mount failed 15:35:50 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00004c000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x68000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:50 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) close(r0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5428, 0x0) 15:35:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000025008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, 0x0) 15:35:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000800)={0x0, 0xfffffead}}, 0x0) [ 2259.711253][ T3592] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2259.719010][ T3592] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2259.719829][ T3591] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2259.737256][ T3591] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 2259.763208][ T3599] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2259.788075][ T3599] EXT4-fs (loop0): Invalid log cluster size: 620756994 [ 2259.805729][ T3592] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2259.819526][ T3592] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2259.838048][ T3592] EXT4-fs: failed to create workqueue [ 2259.847155][ T3592] EXT4-fs (loop2): mount failed 15:35:50 executing program 4: r0 = socket(0xa, 0x3, 0x1) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x3b, &(0x7f0000000100)={0x0}}, 0x0) 15:35:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200100c1, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) close(r0) r2 = gettid() tkill(r2, 0x1000000000016) 15:35:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x6c000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000027008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'team0\x00', {'team_slave_0\x00'}}) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 15:35:50 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00005c000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001780)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000005400)) [ 2260.120736][ T3628] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2260.129794][ T3625] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2260.137707][ T3625] EXT4-fs (loop0): Invalid log cluster size: 654311426 [ 2260.156421][ T3630] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2260.167607][ T3628] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:51 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 2260.211338][ T3630] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200002e008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 2260.282366][ T3628] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2260.291627][ T3630] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2260.301432][ T3630] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2260.325324][ T3630] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2260.337836][ T3630] EXT4-fs (loop2): get root inode failed [ 2260.343570][ T3630] EXT4-fs (loop2): mount failed [ 2260.351045][ T3651] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2260.355189][ T3628] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2260.357950][ T3651] EXT4-fs (loop0): Invalid log cluster size: 771751938 15:35:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) close(r0) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000200)={@multicast1, @multicast2, r2}, 0xc) 15:35:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x74000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x40) 15:35:51 executing program 4: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000580)) [ 2260.618083][ T3670] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2260.639853][ T3670] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:51 executing program 1: socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003b40)=[{{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) dup3(r0, r2, 0x0) sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 15:35:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000048008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2260.766496][ T3642] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2260.781323][ T3670] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2260.788452][ T3670] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2260.802416][ T3642] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2260.844437][ T3683] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2260.891897][ T3683] EXT4-fs (loop0): Invalid log cluster size: 1207959554 [ 2260.899023][ T3642] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2260.936203][ T3642] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2260.949609][ T3642] EXT4-fs: failed to create workqueue [ 2260.959312][ T3642] EXT4-fs (loop2): mount failed 15:35:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x349, 0x20010080, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup2(r0, r0) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 15:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7a000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:52 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:35:52 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) fchown(r0, 0x0, 0xffffffffffffffff) 15:35:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200004a008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:52 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000060000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:52 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000380)=0x404100000001, 0xfe3f) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000240)=[@sack_perm, @sack_perm, @mss], 0x20000000000002b2) 15:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x89000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2261.410954][ T3700] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2261.418863][ T3700] EXT4-fs (loop0): Invalid log cluster size: 1241513986 [ 2261.419511][ T3701] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2261.439539][ T3701] EXT4-fs (loop3): Can't read superblock on 2nd try 15:35:52 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, 0x0) [ 2261.500985][ T3713] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2261.524031][ T3713] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2261.541622][ T3713] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 15:35:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200004b008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x4, 0x0, &(0x7f0000000040)) [ 2261.551372][ T3713] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2261.579038][ T3713] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2261.592899][ T3713] EXT4-fs (loop2): get root inode failed 15:35:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) [ 2261.598540][ T3713] EXT4-fs (loop2): mount failed 15:35:52 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = dup2(r0, r0) sendmsg$NL80211_CMD_SET_MAC_ACL(r1, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f0000000380)={0x0}}, 0x0) 15:35:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) [ 2261.694963][ T3726] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2261.702519][ T3738] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2261.709515][ T3738] EXT4-fs (loop0): Invalid log cluster size: 1258291202 [ 2261.730486][ T3726] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:52 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x40, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 15:35:52 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f00000010c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r2, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r2, r3, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 2261.753709][ T3738] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2261.761423][ T3738] EXT4-fs (loop0): Invalid log cluster size: 1258291202 [ 2261.792498][ T3726] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 15:35:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200004c008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2261.803848][ T3726] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2261.817371][ T3726] EXT4-fs: failed to create workqueue [ 2261.823161][ T3726] EXT4-fs (loop2): mount failed 15:35:52 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000068000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) 15:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x8cffffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:52 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) 15:35:52 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)) [ 2262.082893][ T3765] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2262.097463][ T3765] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2262.108020][ T3768] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2262.117715][ T3765] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 15:35:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) 15:35:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) [ 2262.143379][ T3768] EXT4-fs (loop0): Invalid log cluster size: 1275068418 15:35:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup2(r0, r0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2262.197117][ T3765] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2262.210527][ T3765] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2262.227800][ T3765] EXT4-fs (loop2): get root inode failed [ 2262.233686][ T3765] EXT4-fs (loop2): mount failed 15:35:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) dup2(r2, r1) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) syz_genetlink_get_family_id$ethtool(0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 15:35:53 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) 15:35:53 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00006c000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200005c008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:53 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = open(&(0x7f0000000140)='./file0\x00', 0x30142, 0x0) dup3(r0, r1, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x88, 0x64, 0x0, &(0x7f0000000080)) 15:35:53 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) 15:35:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x948017bd, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2262.472365][ T3804] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2262.482912][ T3803] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2262.492156][ T3804] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2262.502239][ T3804] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 15:35:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x4000844) [ 2262.515711][ T3804] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2262.555340][ T3804] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2262.558990][ T3803] EXT4-fs (loop0): Invalid log cluster size: 1543503874 15:35:53 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) 15:35:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000060008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) r2 = accept4$inet6(r1, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{}, "36d1ab5859f3649e", "20d7b18ca6b9e107541ea96873f416fe", "56cdd724", "92589a4a07d2b2fc"}, 0x28) 15:35:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x5451, 0x0) [ 2262.649398][ T3804] EXT4-fs (loop2): get root inode failed [ 2262.656936][ T3804] EXT4-fs (loop2): mount failed 15:35:53 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) 15:35:53 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5421, &(0x7f00000001c0)={'gretap0\x00'}) [ 2262.724864][ T3831] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2262.734365][ T3831] EXT4-fs (loop0): Invalid log cluster size: 1610612738 [ 2262.765940][ T3817] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2262.788674][ T3817] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2262.823473][ T3817] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2262.834804][ T3817] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2262.846307][ T3817] EXT4-fs: failed to create workqueue [ 2262.851874][ T3817] EXT4-fs (loop2): mount failed 15:35:53 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000074000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x97ffffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:53 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) 15:35:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000068008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = creat(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, 0x0) 15:35:53 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) 15:35:53 executing program 1: r0 = inotify_init() close(r0) openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 15:35:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) [ 2263.116814][ T3857] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2263.127454][ T3857] EXT4-fs (loop0): Invalid log cluster size: 1744830466 [ 2263.149979][ T3866] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2263.172103][ T3866] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2263.203850][ T3866] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2263.219485][ T3866] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2263.263176][ T3866] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2263.312327][ T3866] EXT4-fs (loop2): get root inode failed [ 2263.318664][ T3866] EXT4-fs (loop2): mount failed [ 2263.394242][ T3875] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2263.401710][ T3875] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2263.419273][ T3875] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2263.433538][ T3875] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2263.448217][ T3875] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2263.464314][ T3875] EXT4-fs (loop2): get root inode failed [ 2263.469994][ T3875] EXT4-fs (loop2): mount failed 15:35:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4004808) 15:35:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) 15:35:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x20440, 0x0) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x247}}, 0x0) dup3(r1, r2, 0x0) preadv(r2, 0x0, 0x0, 0x0, 0x0) 15:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x9a1c0000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200006c008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:54 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000075000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$TCSBRK(r0, 0x5409, 0x0) 15:35:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) 15:35:54 executing program 5: r0 = socket(0x2, 0x2, 0x0) write$tun(r0, 0x0, 0x0) [ 2263.642033][ T3899] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2263.656532][ T3899] EXT4-fs (loop0): Invalid log cluster size: 1811939330 15:35:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) 15:35:54 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000200)) 15:35:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3", 0x1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x40003a0, 0x0, 0x0) tkill(r1, 0x14) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 15:35:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000040)) 15:35:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) [ 2263.813426][ T3907] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2263.836630][ T3907] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, 0x0) [ 2263.887593][ T3907] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2263.898461][ T3907] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x9b1c0000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000074008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2263.940315][ T3907] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2264.002834][ T3907] EXT4-fs (loop2): get root inode failed [ 2264.005802][ T3942] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2264.009440][ T3907] EXT4-fs (loop2): mount failed [ 2264.050090][ T3942] EXT4-fs (loop0): Invalid log cluster size: 1946157058 [ 2264.092775][ T3920] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2264.099961][ T3920] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2264.110118][ T3920] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2264.121725][ T3920] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2264.176534][ T3920] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2264.197635][ T3920] EXT4-fs (loop2): get root inode failed [ 2264.209778][ T3920] EXT4-fs (loop2): mount failed 15:35:55 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00007a000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:55 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)) 15:35:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) 15:35:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x5452, 0x504a03) 15:35:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000075008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xbd178094, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) 15:35:55 executing program 5: mknod(0x0, 0x894a2fcc01d3350b, 0x0) 15:35:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000180)='./file1\x00', 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0, 0x100}}, 0x24000040) 15:35:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="ac"], 0xac}}, 0x0) close(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r2, 0x1000000000016) [ 2264.412550][ T3967] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2264.425606][ T3975] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) 15:35:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xc0ed0000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2264.455666][ T3967] EXT4-fs (loop0): Invalid log cluster size: 1962934274 [ 2264.511366][ T3975] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2264.550772][ T3975] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2264.592643][ T3975] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2264.604247][ T3975] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2264.624497][ T3975] EXT4-fs (loop2): get root inode failed [ 2264.630145][ T3975] EXT4-fs (loop2): mount failed [ 2264.645028][ T3999] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2264.656238][ T3999] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2264.724200][ T3989] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2264.731787][ T3999] EXT4-fs (loop3): Test dummy encryption mode enabled [ 2264.738817][ T3989] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2264.756642][ T3999] EXT4-fs (loop3): Can't read superblock on 2nd try [ 2264.772000][ T3989] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2264.786205][ T3989] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2264.827981][ T3989] EXT4-fs: failed to create workqueue [ 2264.855535][ T3989] EXT4-fs (loop2): mount failed 15:35:55 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00007e000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCMSET(r0, 0x541b, &(0x7f0000000040)) 15:35:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200007a008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) 15:35:55 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup(r0) ioctl$CHAR_RAW_ROTATIONAL(r1, 0x127e, 0x0) 15:35:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xdb030000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) 15:35:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/dev_mcast\x00') fcntl$setownex(r0, 0xf, &(0x7f0000000000)) 15:35:55 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) sendmsg$NL80211_CMD_ASSOCIATE(r1, &(0x7f00000013c0)={&(0x7f0000001280), 0xc, &(0x7f0000001380)={0x0, 0x7c}}, 0x20008000) 15:35:55 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x21, 0x0, &(0x7f00000000c0)) 15:35:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) 15:35:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) read$char_raw(r0, 0x0, 0x29) [ 2265.080344][ T4023] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2265.094970][ T4023] EXT4-fs (loop0): Invalid log cluster size: 2046820354 [ 2265.114902][ T4034] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2265.213946][ T4034] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2265.267968][ T4034] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2265.328144][ T4034] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2265.356927][ T4034] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2265.379048][ T4034] EXT4-fs (loop2): get root inode failed [ 2265.404706][ T4034] EXT4-fs (loop2): mount failed [ 2265.444143][ T4045] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2265.502631][ T4045] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2265.530424][ T4045] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2265.540314][ T4045] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2265.570547][ T4045] EXT4-fs: failed to create workqueue [ 2265.575929][ T4045] EXT4-fs (loop2): mount failed 15:35:56 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000089000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xdc030000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200007e008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) 15:35:56 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) 15:35:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000001580)='/proc/self/attr/current\x00', 0x2, 0x0) dup2(r0, r1) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 15:35:56 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup2(r1, r1) r3 = accept4$inet6(r2, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:35:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x4a, &(0x7f00000001c0)={'raw\x00', 0x2, [{}, {}]}, 0x48) 15:35:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x400000841, 0x0) dup3(r0, r1, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000000)) 15:35:56 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x6, &(0x7f0000000000)=@nat={'nat\x00', 0x19, 0x6, 0x0, [0x20000a40, 0x0, 0x0, 0x20000cd4, 0x20000f80], 0x0, 0x0, 0x0}, 0x108) [ 2265.769121][ T4078] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2265.780768][ T4078] EXT4-fs (loop0): Invalid log cluster size: 2113929218 15:35:56 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) sendmsg$NL80211_CMD_SET_MAC_ACL(r2, &(0x7f0000000240)={0x0, 0xffffffffffffffc4, &(0x7f0000000280)={0x0, 0x28}}, 0x0) 15:35:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000089008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2265.836466][ T4081] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2265.845068][ T4081] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2265.864476][ T4081] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2265.874987][ T4081] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2265.906826][ T4081] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2265.920596][ T4081] EXT4-fs (loop2): get root inode failed [ 2265.926351][ T4081] EXT4-fs (loop2): mount failed [ 2266.036850][ T4099] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2266.044972][ T4123] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2266.053430][ T4123] EXT4-fs (loop0): Invalid log cluster size: 2298478594 [ 2266.065090][ T4099] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2266.078310][ T4099] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2266.093794][ T4099] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2266.105516][ T4099] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2266.117853][ T4099] EXT4-fs (loop2): get root inode failed [ 2266.123894][ T4099] EXT4-fs (loop2): mount failed 15:35:57 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000b1000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:57 executing program 4: r0 = eventfd2(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 15:35:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) dup3(r0, r1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0xb, 0x0, &(0x7f0000000000)) 15:35:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xdd030000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000001fc0)='./file1\x00', 0x80040, 0x0) ioctl$EVIOCGBITKEY(r0, 0x5450, 0x0) 15:35:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000bb008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdfd, &(0x7f0000000240)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) tkill(r1, 0x1000000000016) 15:35:57 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x5451) [ 2266.285072][ T4141] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2266.295450][ T4141] EXT4-fs (loop0): Invalid log cluster size: 3137339394 15:35:57 executing program 5: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000580)={0x0}}, 0x0) [ 2266.327757][ T4145] EXT4-fs (loop2): Test dummy encryption mode enabled 15:35:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000bc008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:57 executing program 4: r0 = eventfd(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) dup2(r2, r3) sendmsg$SMC_PNETID_ADD(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[], 0x3c}}, 0x0) 15:35:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xeaffffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2266.397440][ T4145] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2266.459573][ T4145] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2266.471308][ T4145] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2266.483193][ T4145] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2266.506631][ T4145] EXT4-fs (loop2): get root inode failed [ 2266.518767][ T4145] EXT4-fs (loop2): mount failed [ 2266.647270][ T4160] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2266.655683][ T4160] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2266.674744][ T4160] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2266.688822][ T4160] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2266.712646][ T4160] EXT4-fs error (device loop2): ext4_fill_super:4709: inode #2: comm syz-executor.2: iget: root inode unallocated [ 2266.731933][ T4160] EXT4-fs (loop2): get root inode failed [ 2266.737640][ T4160] EXT4-fs (loop2): mount failed 15:35:57 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000f3010000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:57 executing program 5: r0 = socket(0x2, 0x2, 0x0) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 15:35:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000bd008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:57 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 15:35:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)) 15:35:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xefffffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:57 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x5452, &(0x7f0000000040)=ANY=[]) 15:35:57 executing program 4: r0 = memfd_create(&(0x7f0000000000)='{\x00', 0x0) r1 = socket$packet(0x11, 0x3, 0x300) dup3(r0, r1, 0x0) ftruncate(r1, 0x0) 15:35:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000002b80), 0x0, 0x40) [ 2267.009251][ T4211] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2267.017306][ T4211] EXT4-fs (loop0): Invalid log cluster size: 3170893826 15:35:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xc, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, "a64fa31e6f47336673f87280544b587ed299a973b9d853931a18e8b08fa413abf2a651090000000000000017b4f930d21d300730ab8054305355309fb77f8eec236635dfdbf8cb9867490a8de67777d4"}, 0xd8) 15:35:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xf6ffffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000069018000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2267.139393][ T4219] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2267.159902][ T4219] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2267.177941][ T4219] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2267.221978][ T4219] EXT4-fs (loop2): group descriptors corrupted! 15:35:58 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000f4010000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:58 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) 15:35:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) 15:35:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$ETHTOOL_MSG_EEE_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x40040) 15:35:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xf9fdffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2267.372276][ T4245] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2267.381095][ T4245] EXT4-fs (loop0): Invalid log cluster size: 1761607682 15:35:58 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) 15:35:58 executing program 4: prctl$PR_SET_UNALIGN(0x23, 0x0) 15:35:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200006a018000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:58 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) 15:35:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfbffffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) dup2(r0, r1) ioctl$FS_IOC_MEASURE_VERITY(r1, 0x8903, &(0x7f0000000000)) [ 2267.597319][ T4285] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2267.605707][ T4273] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2267.621668][ T4285] EXT4-fs (loop0): Invalid log cluster size: 1778384898 [ 2267.628885][ T4273] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:35:58 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x258}}, 0x0) [ 2267.642020][ T4273] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2267.653670][ T4273] EXT4-fs (loop2): group descriptors corrupted! [ 2267.816584][ T4279] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2267.836420][ T4279] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2267.856086][ T4279] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2267.878092][ T4279] EXT4-fs (loop2): group descriptors corrupted! 15:35:58 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000f5010000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:58 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000100)=""/246, &(0x7f0000000000)=0xf6) 15:35:58 executing program 4: capset(&(0x7f00002d0ff8)={0x20080522}, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) [ 2267.988179][ T4321] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2267.995365][ T4321] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2268.010469][ T4321] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2268.030228][ T4321] EXT4-fs (loop2): group descriptors corrupted! [ 2268.113680][ T4330] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2268.124559][ T4330] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2268.142418][ T4330] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2268.156789][ T4330] EXT4-fs (loop2): group descriptors corrupted! 15:35:59 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) accept4$inet(r1, 0x0, 0x0, 0x0) close(r1) socket$packet(0x11, 0x2, 0x300) tkill(r0, 0x1000000000016) 15:35:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200006b018000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:35:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfdfdffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:59 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) close(r0) r1 = socket(0xa, 0x1, 0x0) sendmsg$inet6(r1, &(0x7f0000002a40)={&(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c, 0x0}, 0x20000068) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000006fc0)={0x0, 0x0, &(0x7f0000006f80)={0x0}}, 0x0) 15:35:59 executing program 5: r0 = socket(0x11, 0x80003, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 15:35:59 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000f8010000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:35:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x1a, 0x0, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 2268.340216][ T4349] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2268.353028][ T4349] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2268.365940][ T4349] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2268.378099][ T4349] EXT4-fs (loop2): group descriptors corrupted! 15:35:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) dup2(r0, r1) sendmsg$NLBL_MGMT_C_ADDDEF(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 2268.392716][ T4350] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2268.402504][ T4350] EXT4-fs (loop0): Invalid log cluster size: 1795162114 15:35:59 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000440)={&(0x7f00000002c0), 0x43, &(0x7f0000000480)={&(0x7f0000000300)={0xd0, 0x0, 0x0, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x4}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6}, @MPTCP_PM_ADDR_ATTR_PORT={0x6}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}]}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private}, @MPTCP_PM_ADDR_ATTR_ID={0x5}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0xd0}}, 0x0) 15:35:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000f8018000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2268.568692][ T4368] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2268.581917][ T4368] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2268.596124][ T4368] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 15:35:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfdffffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:35:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 15:35:59 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSRS485(r1, 0x542f, 0x0) 15:35:59 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000f9010000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2268.619089][ T4368] EXT4-fs (loop2): group descriptors corrupted! 15:35:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfeffffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2268.721706][ T4398] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2268.752812][ T4398] EXT4-fs (loop0): Invalid log cluster size: 4160749570 [ 2268.926676][ T4411] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2268.945559][ T4411] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2268.966986][ T4411] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2268.981013][ T4411] EXT4-fs (loop2): group descriptors corrupted! 15:36:00 executing program 4: socket(0x2000000100000010, 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000040)) 15:36:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 15:36:00 executing program 1: pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, 0x0) 15:36:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000004028000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xff0f0000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2269.164818][ T4420] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2269.188238][ T4420] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2269.227812][ T4420] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2269.245413][ T4420] EXT4-fs (loop2): group descriptors corrupted! 15:36:00 executing program 1: r0 = socket(0x11, 0xa, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 15:36:00 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x0, 0x0) dup2(r0, r1) write$binfmt_aout(r1, 0x0, 0x0) 15:36:00 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000004020000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2269.329051][ T4440] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2269.345882][ T4440] EXT4-fs (loop0): Invalid log cluster size: 67108866 15:36:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfffbffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000094028000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:00 executing program 1: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 15:36:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x3d6, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r2 = accept4$inet6(r0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:36:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x40) 15:36:00 executing program 4: r0 = socket$inet(0x10, 0x803, 0x0) write$P9_RLCREATE(r0, 0x0, 0x0) 15:36:00 executing program 1: pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 2269.576874][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2269.597934][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:36:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x1) [ 2269.642997][ T4460] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2269.643142][ T4459] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2269.649833][ T4460] EXT4-fs (loop0): Invalid log cluster size: 2483027970 15:36:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000095028000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xffffe000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:00 executing program 4: restart_syscall() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4) [ 2269.700802][ T4459] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2269.738831][ T4459] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2269.801124][ T4459] EXT4-fs (loop2): group descriptors corrupted! [ 2269.931176][ T4497] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2269.950059][ T4497] EXT4-fs (loop0): Invalid log cluster size: 2499805186 [ 2269.991122][ T4475] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2269.998186][ T4475] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2270.011068][ T4475] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2270.024316][ T4475] EXT4-fs (loop2): group descriptors corrupted! 15:36:00 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000006020000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendto$unix(r0, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffb3) 15:36:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) write$P9_RLOCK(r2, 0x0, 0x0) 15:36:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80241, 0x54) 15:36:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfffffbff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000096028000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, 0x0) 15:36:01 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x200, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) 15:36:01 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') r1 = socket(0x10, 0x2, 0x0) dup3(r1, r0, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 15:36:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) dup2(r0, r1) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 15:36:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 15:36:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "3f15198617b24e4611bc154690384de5d2ffcb"}) [ 2270.227724][ T4526] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2270.244786][ T4526] EXT4-fs (loop0): Invalid log cluster size: 2516582402 [ 2270.287438][ T4528] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2270.298576][ T4528] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2270.357687][ T4528] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2270.370253][ T4528] EXT4-fs (loop2): group descriptors corrupted! [ 2270.405594][ T4543] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2270.412878][ T4543] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2270.424255][ T4543] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2270.436103][ T4543] EXT4-fs (loop2): group descriptors corrupted! 15:36:01 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000a020000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$NL80211_CMD_SET_MCAST_RATE(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 15:36:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfffffdf9, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000038000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="0130b02a804b1f58692a2774eb6e2af5", 0x10) 15:36:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 15:36:01 executing program 1: fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x88) [ 2270.565054][ T4565] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2270.577827][ T4565] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2270.596412][ T4565] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 15:36:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200100c1, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) close(r0) r2 = gettid() socket$unix(0x1, 0x5, 0x0) tkill(r2, 0x1000000000016) [ 2270.611241][ T4565] EXT4-fs (loop2): group descriptors corrupted! [ 2270.650881][ T4568] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2270.659851][ T4568] EXT4-fs (loop0): #blocks per group too big: 32771 15:36:01 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, 0x0) [ 2270.765809][ T4578] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2270.778168][ T4578] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000f7038000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:01 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000003080)={0x0}}, 0x0) 15:36:01 executing program 5: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 2270.857794][ T4578] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2270.883948][ T4578] EXT4-fs (loop2): group descriptors corrupted! [ 2270.896486][ T4597] EXT4-fs (loop0): Test dummy encryption mode enabled 15:36:01 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000b020000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfffffdfd, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:01 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) [ 2270.909034][ T4597] EXT4-fs (loop0): Invalid log cluster size: 4143972354 15:36:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) dup3(r0, r1, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) [ 2271.063032][ T4614] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2271.078492][ T4614] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2271.102363][ T4614] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2271.166107][ T4614] EXT4-fs (loop2): group descriptors corrupted! [ 2271.241102][ T4623] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2271.253648][ T4623] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2271.275526][ T4623] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2271.298119][ T4623] EXT4-fs (loop2): group descriptors corrupted! 15:36:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) dup2(r0, r1) ioctl$TCXONC(r1, 0x540a, 0x0) 15:36:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000f8038000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:02 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r0, r1, 0x0) ioctl$EVIOCRMFF(r2, 0x40044581, 0x0) 15:36:02 executing program 5: r0 = socket(0x2, 0x3, 0xb) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 15:36:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xffffff7f, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:02 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000c020000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @mss, @window, @mss, @window={0x3, 0x0, 0x401}, @window], 0x2000000000000277) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 15:36:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xffffff8c, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r1) sendmsg$DEVLINK_CMD_PORT_SET(r1, 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000180)) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @multicast}, 0x10) r3 = open(&(0x7f0000000200)='./file0\x00', 0x10000000040040, 0x0) dup3(r0, r3, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) [ 2271.543556][ T4635] EXT4-fs (loop0): Test dummy encryption mode enabled 15:36:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') write$cgroup_pid(r0, 0x0, 0x0) 15:36:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000100)={0x0, 0x41d, &(0x7f0000000180)={0x0}}, 0x4) 15:36:02 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2271.589479][ T4635] EXT4-fs (loop0): Invalid log cluster size: 4160749570 15:36:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "1a00009646ff26caffffff0000c1fffffff300"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 15:36:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000f9038000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) ioctl$TCGETX(r1, 0x5425, 0x0) 15:36:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xffffff97, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2271.790369][ T4653] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2271.800143][ T4653] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2271.809944][ T4653] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2271.820912][ T4653] EXT4-fs (loop2): group descriptors corrupted! 15:36:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$TUNGETVNETHDRSZ(r1, 0x5450, 0x0) [ 2271.952708][ T4663] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2271.966383][ T4683] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2271.974896][ T4663] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2271.988540][ T4683] EXT4-fs (loop0): Invalid log cluster size: 4177526786 [ 2271.994167][ T4663] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2272.029357][ T4663] EXT4-fs (loop2): group descriptors corrupted! 15:36:03 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000030000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:03 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x84\x0e\x13s\xf1\xb5\x05\xe2qO\xb8\x893\x81`\xd2\x99\x96\x01\x00\x00\x00\x00\x00\x00\x00\x1c\a\xd0#\x05%\x18\x17Z\xa2gS\xc1\xe0\v\xcb\t\xe6\xe6*\xe9\xa3\xdc\x91', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) ioctl$FICLONERANGE(r0, 0x5452, &(0x7f0000000080)) 15:36:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000003100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) 15:36:03 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 15:36:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xffffffea, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000002048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 15:36:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5452, &(0x7f0000002200)={{}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 15:36:03 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='maps\x00') write$cgroup_type(r0, 0x0, 0x0) 15:36:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RCLUNK(r1, 0x0, 0x0) shutdown(r1, 0x0) 15:36:03 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000180)) [ 2272.264837][ T4711] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2272.275526][ T4721] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2272.284522][ T4711] EXT4-fs (loop0): Invalid log cluster size: 33554434 [ 2272.295562][ T4721] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$NL80211_CMD_SET_WDS_PEER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x44}}, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) tkill(r2, 0x1000000000016) [ 2272.308945][ T4721] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2272.319465][ T4721] EXT4-fs (loop2): group descriptors corrupted! [ 2272.476797][ T4734] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2272.484041][ T4734] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2272.500945][ T4734] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2272.517269][ T4734] EXT4-fs (loop2): group descriptors corrupted! 15:36:03 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00004e030000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000000)=0x80) dup2(r0, r1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:36:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xffffffef, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000001580)='/proc/self/attr/current\x00', 0x2, 0x0) dup2(r0, r1) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 15:36:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000006048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:03 executing program 4: r0 = epoll_create(0x40000acf) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) [ 2272.676073][ T4758] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2272.687368][ T4758] EXT4-fs (loop0): Invalid log cluster size: 100663298 [ 2272.698527][ T4762] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2272.707840][ T4762] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2272.718770][ T4762] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2272.729047][ T4762] EXT4-fs (loop2): group descriptors corrupted! [ 2272.884091][ T4771] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2272.891246][ T4771] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2272.909131][ T4771] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2272.923781][ T4771] EXT4-fs (loop2): group descriptors corrupted! 15:36:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8917, &(0x7f0000000040)={'lo\x00', @ifru_names}) 15:36:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000)) 15:36:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8923, &(0x7f0000000000)={'sit0\x00', 0x0}) 15:36:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000010048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfffffff6, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:03 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000002040000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:04 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) write$apparmor_current(r0, 0x0, 0x0) 15:36:04 executing program 4: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self\x00', 0x0, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 15:36:04 executing program 1: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) 15:36:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_GETFSMAP(r0, 0x5452, &(0x7f00000000c0)) [ 2273.159676][ T4789] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2273.170520][ T4789] EXT4-fs (loop0): Invalid log cluster size: 268435458 15:36:04 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:36:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000017048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2273.201667][ T4791] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2273.214696][ T4791] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2273.227251][ T4791] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2273.237499][ T4791] EXT4-fs (loop2): group descriptors corrupted! 15:36:04 executing program 4: r0 = socket$nl_generic(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000080), 0x28f, &(0x7f0000000100)={&(0x7f0000000200)={0x34, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0xfffffffffffffe6c, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'gretap0\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x34}}, 0x0) 15:36:04 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2, 0x0) write$P9_RWSTAT(r0, 0x0, 0x0) 15:36:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfffffffb, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2273.357610][ T4813] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2273.375584][ T4813] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:04 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001740)='/dev/zero\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$NL80211_CMD_ABORT_SCAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:36:04 executing program 5: pipe(&(0x7f0000001300)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) [ 2273.418906][ T4832] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2273.418975][ T4813] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2273.425779][ T4832] EXT4-fs (loop0): Invalid log cluster size: 385875970 [ 2273.503904][ T4813] EXT4-fs (loop2): group descriptors corrupted! 15:36:04 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000006040000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:04 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) 15:36:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000018048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:04 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) close(r0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f00000000c0)) 15:36:04 executing program 5: r0 = socket(0x11, 0x3, 0x0) connect$netlink(r0, 0x0, 0x0) 15:36:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfffffffd, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:04 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, 0x0) 15:36:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4000) 15:36:04 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f0000000300)={0x2, 0x4e22, @remote}, 0x10) getpeername(r2, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) dup3(r2, r3, 0x0) fadvise64(r1, 0x0, 0x0, 0x0) [ 2273.730025][ T4865] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2273.741251][ T4865] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2273.746967][ T4862] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2273.763957][ T4865] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 15:36:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000100)) write$P9_RSYMLINK(r2, 0x0, 0x0) 15:36:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) 15:36:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup2(r0, r1) preadv(r1, 0x0, 0x0, 0x0, 0x0) [ 2273.813004][ T4865] EXT4-fs (loop2): group descriptors corrupted! [ 2273.842363][ T4862] EXT4-fs (loop0): Invalid log cluster size: 402653186 [ 2273.978625][ T4883] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2273.995124][ T4883] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:05 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000010040000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:05 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup2(r0, r1) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000100)) 15:36:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDDISABIO(r0, 0x4b37) 15:36:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xfffffffe, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000019048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:05 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) close(r0) memfd_create(&(0x7f0000000500)='lotrusted,system&.:}(eth0,\x00', 0x0) write$cgroup_pid(r0, 0x0, 0x0) [ 2274.042868][ T4883] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2274.074502][ T4883] EXT4-fs (loop2): group descriptors corrupted! 15:36:05 executing program 1: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, 0x0, 0x0) 15:36:05 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 15:36:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5450, 0x0) 15:36:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004) r2 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r2, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000080)=0xfef8) r4 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r4, r3) getpeername(r1, 0x0, &(0x7f00000002c0)) 15:36:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000000)={0x0, 0x40, &(0x7f0000000280)={0x0, 0xffffffffffffffe9}}, 0x0) [ 2274.203132][ T4915] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2274.229748][ T4915] EXT4-fs (loop0): Invalid log cluster size: 419430402 15:36:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0x5450, 0x0) [ 2274.325930][ T4932] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2274.343334][ T4932] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2274.414341][ T4932] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2274.435054][ T4932] EXT4-fs (loop2): group descriptors corrupted! [ 2274.534826][ T4944] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2274.542493][ T4944] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2274.562768][ T4944] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2274.577674][ T4944] EXT4-fs (loop2): group descriptors corrupted! 15:36:05 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000050000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x3c0ea1de3f11539b) 15:36:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:36:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001a048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0000e2ffff0acaffffff3e80e1fffffff300"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, 0x0) 15:36:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 15:36:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffff7, 0x20010001, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r1, 0x1000000000016) 15:36:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r0, r1, 0x0) getpeername$unix(r1, 0x0, &(0x7f0000000100)) 15:36:05 executing program 5: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 2274.740108][ T4964] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2274.761211][ T4964] EXT4-fs (loop0): Invalid log cluster size: 436207618 15:36:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001b048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2274.851829][ T4980] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2274.859055][ T4980] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:05 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x5450, r1) [ 2274.917857][ T4980] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2274.932123][ T4980] EXT4-fs (loop2): group descriptors corrupted! [ 2274.974570][ T5004] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2274.983429][ T5004] EXT4-fs (loop0): Invalid log cluster size: 452984834 [ 2274.983753][ T4993] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2275.012908][ T4993] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2275.039660][ T4993] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2275.053463][ T4993] EXT4-fs (loop2): group descriptors corrupted! 15:36:06 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000060000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x8000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000140)) 15:36:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$lock(r0, 0x7, &(0x7f00000001c0)) 15:36:06 executing program 1: r0 = socket(0x11, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) 15:36:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001c048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) r1 = dup2(r0, r0) connect$unix(r1, &(0x7f0000000200)=@abs, 0x6e) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 15:36:06 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 15:36:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf32(r0, 0x0, 0x1) [ 2275.315964][ T5023] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2275.323122][ T5031] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2275.325005][ T5023] EXT4-fs (loop0): Invalid log cluster size: 469762050 15:36:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001d048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:06 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0xf, &(0x7f0000000100)) 15:36:06 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x4010) [ 2275.403105][ T5031] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2275.417434][ T5031] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2275.452983][ T5031] EXT4-fs (loop2): group descriptors corrupted! [ 2275.535801][ T5051] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2275.543968][ T5051] EXT4-fs (loop0): Invalid log cluster size: 486539266 [ 2275.544298][ T5044] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2275.558523][ T5044] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2275.568426][ T5044] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2275.578854][ T5044] EXT4-fs (loop2): group descriptors corrupted! 15:36:06 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000002060000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x80000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:06 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) 15:36:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) write$binfmt_script(r1, 0x0, 0x0) 15:36:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000540)={0xffffffffffffffff}) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_SET_MCAST_RATE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:36:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001e048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:06 executing program 5: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) fchdir(r0) 15:36:06 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) r2 = dup2(r1, r1) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x183441, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$P9_RSYMLINK(r2, 0x0, 0x0) dup2(r3, r1) tkill(r0, 0x1000000000016) [ 2275.679064][ T5070] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2275.686340][ T5070] EXT4-fs (loop0): Invalid log cluster size: 503316482 15:36:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xedc000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2275.769736][ T5078] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2275.799629][ T5078] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f00000000000000020000000200001f048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2275.816126][ T5078] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2275.830078][ T5078] EXT4-fs (loop2): group descriptors corrupted! 15:36:06 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x201, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 15:36:06 executing program 1: prlimit64(0x0, 0x7, &(0x7f0000000040), 0x0) epoll_create(0x1) 15:36:06 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000004060000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:06 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) r2 = dup2(r1, r1) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x183441, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$P9_RSYMLINK(r2, 0x0, 0x0) dup2(r3, r1) tkill(r0, 0x1000000000016) 15:36:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2276.026198][ T5097] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2276.033163][ T5097] EXT4-fs (loop0): Invalid log cluster size: 520093698 15:36:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x2000c004) 15:36:06 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x201, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 15:36:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000020048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:07 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4$inet6(r1, 0x0, 0x0, 0x0) getsockopt$sock_int(r2, 0x1, 0x23, 0x0, &(0x7f0000000140)) [ 2276.116297][ T5110] EXT4-fs (loop2): Test dummy encryption mode enabled 15:36:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0x5450, 0x0) [ 2276.169116][ T5110] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2276.207099][ T5110] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 15:36:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x0) dup2(r0, r1) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0xb, 0x0, &(0x7f0000000280)) 15:36:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000980)='/proc/thread-self\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) [ 2276.220651][ T5110] EXT4-fs (loop2): group descriptors corrupted! 15:36:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2276.349088][ T5129] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2276.358074][ T5121] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2276.363152][ T5129] EXT4-fs (loop0): Invalid log cluster size: 536870914 [ 2276.382910][ T5121] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2276.403539][ T5121] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2276.417734][ T5121] EXT4-fs (loop2): group descriptors corrupted! 15:36:07 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000070000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x0, 0x0) dup2(r0, r1) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x1c) 15:36:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080), 0x4) 15:36:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000021048000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 15:36:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 15:36:07 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f00000001c0), 0x4) [ 2276.618456][ T5169] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2276.629995][ T5165] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2276.648888][ T5165] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x4000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:07 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) getsockname(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000040)=0x80) fstatfs(r1, &(0x7f0000000240)=""/12) [ 2276.721952][ T5169] EXT4-fs (loop0): Invalid log cluster size: 553648130 [ 2276.729775][ T5165] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2276.740521][ T5165] EXT4-fs (loop2): group descriptors corrupted! 15:36:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000058000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4008000, &(0x7f0000000780)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 15:36:07 executing program 1: r0 = eventfd2(0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 15:36:07 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000090000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r0, r1) getsockopt$inet_mreq(r1, 0x0, 0x20, 0x0, &(0x7f0000000100)) 15:36:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = dup2(r0, r0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x40}}, 0x0) [ 2276.963852][ T5194] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2276.981311][ T5194] EXT4-fs (loop0): #blocks per group too big: 32773 15:36:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7ffffffffffff, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/exec\x00', 0x2, 0x0) dup3(r0, r1, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) 15:36:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_SET_BSS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:36:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000068000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2277.050470][ T5205] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2277.057887][ T5205] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2277.069281][ T5205] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2277.081436][ T5205] EXT4-fs (loop2): group descriptors corrupted! 15:36:08 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x30001, 0x0) 15:36:08 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) umount2(0x0, 0x0) 15:36:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 2277.129671][ T5217] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2277.154665][ T5217] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2277.175370][ T5217] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2277.188569][ T5217] EXT4-fs (loop2): group descriptors corrupted! [ 2277.211949][ T5229] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2277.221894][ T5229] EXT4-fs (loop0): #blocks per group too big: 32774 15:36:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r0, r1) lseek(r1, 0x0, 0x0) 15:36:08 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x40, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 15:36:08 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000a0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x5450, 0x0) 15:36:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x8000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000004068000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:08 executing program 5: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cubic\x00', 0x6) [ 2277.400882][ T5262] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2277.407814][ T5262] EXT4-fs (loop0): Invalid log cluster size: 67108866 15:36:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x5451, 0x0) 15:36:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000078000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x18, 0x0, &(0x7f0000000100)) [ 2277.509874][ T5261] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2277.539086][ T5261] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xc000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:08 executing program 5: r0 = socket(0xa, 0x3, 0x3) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x29, 0x22, 0x0, 0x3000000) 15:36:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = epoll_create1(0x0) dup2(r0, r1) sendmsg$DEVLINK_CMD_TRAP_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 15:36:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$char_usb(r0, 0x0, 0x0) [ 2277.591166][ T5261] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2277.625306][ T5261] EXT4-fs (loop2): group descriptors corrupted! [ 2277.671974][ T5278] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2277.688316][ T5278] EXT4-fs (loop0): #blocks per group too big: 32775 [ 2277.706023][ T5273] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2277.724875][ T5273] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2277.754839][ T5273] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2277.770652][ T5273] EXT4-fs (loop2): group descriptors corrupted! 15:36:08 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000020a0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:08 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={0x0}}, 0x0) 15:36:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000001640)='./file0\x00', 0x5) 15:36:08 executing program 1: r0 = socket(0x2, 0x1, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x4004050) 15:36:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000098000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x40000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:08 executing program 4: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) 15:36:08 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000002d40)={0x0, 0x0, &(0x7f0000002d00)={0x0}}, 0x0) 15:36:08 executing program 5: r0 = socket(0x2, 0x802, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 15:36:08 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f00000010c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r1, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r3, r4, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:36:08 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001300)='/dev/full\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) [ 2277.973915][ T5309] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2277.981280][ T5309] EXT4-fs (loop0): #blocks per group too big: 32777 15:36:09 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RAUTH(r0, 0x0, 0x0) [ 2278.045380][ T5317] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2278.052663][ T5317] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2278.078307][ T5317] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2278.182438][ T5317] EXT4-fs (loop2): group descriptors corrupted! [ 2278.252490][ T5332] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2278.263687][ T5332] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2278.273593][ T5332] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2278.291740][ T5332] EXT4-fs (loop2): group descriptors corrupted! 15:36:09 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000b0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000000a8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:09 executing program 4: r0 = socket(0x1, 0x5, 0x0) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:36:09 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8de3f6bd37f98b5c) 15:36:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xe0ffff00000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:09 executing program 5: r0 = epoll_create(0x10000) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) 15:36:09 executing program 5: r0 = epoll_create1(0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 15:36:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$binfmt_script(r2, 0x0, 0x0) 15:36:09 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) fstatfs(r0, &(0x7f0000000000)=""/207) 15:36:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) dup2(r0, r1) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000040)) 15:36:09 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) 15:36:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000380)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132320) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={0x0}}, 0x20000040) [ 2278.491443][ T5357] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2278.508732][ T5363] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2278.544900][ T5357] EXT4-fs (loop0): #blocks per group too big: 32778 [ 2278.560456][ T5363] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2278.570732][ T5363] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2278.581074][ T5363] EXT4-fs (loop2): group descriptors corrupted! 15:36:09 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000020b0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x100000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) write$evdev(0xffffffffffffffff, &(0x7f00000000c0)=[{{0x0, 0x7530}}, {{0x0, 0x2710}, 0x0, 0x0, 0x100}], 0x30) r2 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x401004000000016) 15:36:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) close(r0) socket$packet(0x11, 0x2, 0x300) tkill(r2, 0x1000000000016) 15:36:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000000b8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) 15:36:09 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 15:36:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x2, &(0x7f0000000300)) [ 2278.735690][ T5395] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2278.744801][ T5395] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2278.761428][ T5395] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2278.778056][ T5395] EXT4-fs (loop2): group descriptors corrupted! 15:36:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5452, &(0x7f0000000680)={{}, "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"}) 15:36:09 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000c0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) r2 = dup(r1) r3 = memfd_create(&(0x7f0000001e40)='\':}.[\\:\x00', 0x0) dup2(r3, r2) pwrite64(r2, &(0x7f0000000000), 0x0, 0x0) [ 2278.877565][ T5409] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2278.888836][ T5409] EXT4-fs (loop0): #blocks per group too big: 32779 15:36:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x200000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:36:09 executing program 5: pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) 15:36:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000000c8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2278.997066][ T5429] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2279.025262][ T5429] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:09 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x50242, 0x180) 15:36:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x20000d0) 15:36:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) write$9p(r2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000009680)='net/ptype\x00') tkill(r1, 0x1000000000013) [ 2279.058086][ T5429] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2279.091867][ T5429] EXT4-fs (loop2): group descriptors corrupted! 15:36:10 executing program 5: r0 = inotify_init1(0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 2279.120411][ T5447] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2279.133099][ T5447] EXT4-fs (loop0): #blocks per group too big: 32780 15:36:10 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) dup2(r1, r0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) 15:36:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x204000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2279.252651][ T5448] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2279.265068][ T5448] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2279.312739][ T5448] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2279.332624][ T5448] EXT4-fs (loop2): group descriptors corrupted! 15:36:10 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000020c0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000000d8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:10 executing program 5: prctl$PR_GET_NO_NEW_PRIVS(0x25) 15:36:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) 15:36:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000440)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$netlink(r1, &(0x7f0000000000)=@unspec, 0xc) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 15:36:10 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) ioctl$EVIOCGKEY(r0, 0x5451, 0x0) 15:36:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xa5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={0x0}}, 0x0) 15:36:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x300000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:10 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), 0x8) [ 2279.505312][ T5482] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2279.517118][ T5492] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2279.535930][ T5482] EXT4-fs (loop0): #blocks per group too big: 32781 15:36:10 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) write$vga_arbiter(r2, 0x0, 0x0) write$P9_RSETATTR(r2, 0x0, 0x0) [ 2279.555692][ T5492] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2279.578863][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:36:10 executing program 1: r0 = epoll_create1(0x0) close(r0) socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000002380)={0x0, 0x0, &(0x7f0000002340)={0x0}}, 0x0) 15:36:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$FIONREAD(r2, 0x541b, 0x0) [ 2279.606197][ T5492] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2279.620157][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2279.626200][ T5492] EXT4-fs (loop2): group descriptors corrupted! [ 2279.770905][ T5503] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2279.781451][ T5503] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2279.795669][ T5503] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2279.807757][ T5503] EXT4-fs (loop2): group descriptors corrupted! 15:36:10 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000d0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000000e8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:10 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x42, 0x0) write$P9_RVERSION(r0, 0x0, 0x0) 15:36:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x5452, &(0x7f0000000040)={0x0, @l2, @ethernet={0x0, @link_local}, @ethernet={0x0, @dev}}) 15:36:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 15:36:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x400000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:10 executing program 1: r0 = socket(0xa, 0x3, 0x3) setsockopt$packet_fanout(r0, 0x29, 0x22, 0x0, 0x0) [ 2279.905720][ T5536] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2279.926486][ T5538] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2279.937798][ T5536] EXT4-fs (loop0): #blocks per group too big: 32782 15:36:10 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='/', 0x0, 0x0) 15:36:10 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') write$binfmt_aout(r0, 0x0, 0x0) [ 2280.006224][ T5538] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:10 executing program 4: r0 = inotify_init() close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[], 0x14}}, 0x0) 15:36:10 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) 15:36:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x500000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2280.046708][ T5538] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2280.058383][ T5538] EXT4-fs (loop2): group descriptors corrupted! [ 2280.183875][ T5551] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2280.194032][ T5551] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2280.226912][ T5551] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2280.241206][ T5551] EXT4-fs (loop2): group descriptors corrupted! 15:36:11 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000e0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 15:36:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000000f8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:11 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000002400)='/dev/input/event#\x00', 0x0, 0x60441) write$P9_RGETLOCK(r0, 0x0, 0x0) 15:36:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003b40)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x5450, 0x0) 15:36:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x600000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:11 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_cred(r0, 0x1, 0x28, &(0x7f00000000c0), 0xb) 15:36:11 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) r2 = dup2(r1, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$P9_RWSTAT(r2, 0x0, 0x5) tkill(r0, 0x1000000000016) [ 2280.402642][ T5585] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2280.432436][ T5585] EXT4-fs (loop0): #blocks per group too big: 32783 15:36:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0}}, 0x0) 15:36:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) dup2(r2, r1) ioctl$BLKGETSIZE(r1, 0x1260, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 2280.533381][ T5597] EXT4-fs (loop2): Test dummy encryption mode enabled 15:36:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000004108000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2280.608131][ T5597] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:11 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) [ 2280.663662][ T5597] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2280.722377][ T5597] EXT4-fs (loop2): group descriptors corrupted! [ 2280.782579][ T5622] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2280.789783][ T5606] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2280.798878][ T5622] EXT4-fs (loop0): Invalid log cluster size: 67108866 [ 2280.806128][ T5606] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2280.817508][ T5606] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2280.827803][ T5606] EXT4-fs (loop2): group descriptors corrupted! 15:36:11 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000f0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:11 executing program 4: timer_create(0x0, &(0x7f0000000380)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() sendmmsg$inet6(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f0000003c40)="eb37eedf61b5a77d0e4da5ca", 0xc}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000003c00)=[{{0x0, 0x0, &(0x7f0000003b00), 0x0, &(0x7f0000000180)=""/106, 0x6a}}], 0x400000000000116, 0x0, &(0x7f0000000040)={0x77359400}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1004000000013) 15:36:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x604000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:11 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000480)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}) 15:36:11 executing program 5: r0 = epoll_create(0x2000000000000001) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 15:36:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000020108000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={0x0}}, 0x4008800) 15:36:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0x0) close(r1) dup(r0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0xb, 0x0, &(0x7f0000000000)) 15:36:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x700000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:11 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x31) listen(r0, 0x0) r1 = accept$inet(r0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$EXT4_IOC_MIGRATE(r1, 0x5450) [ 2281.007580][ T5649] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2281.033414][ T5649] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:12 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001300)='/dev/urandom\x00', 0x0, 0x0) ioctl$CHAR_RAW_SECTGET(r0, 0x1267, 0x0) [ 2281.079023][ T5660] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2281.085984][ T5660] EXT4-fs (loop0): Invalid log cluster size: 536870914 [ 2281.096611][ T5649] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 15:36:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x804) [ 2281.139375][ T5649] EXT4-fs (loop2): group descriptors corrupted! [ 2281.307428][ T5664] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2281.326007][ T5664] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:12 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000004100000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2281.354285][ T5664] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2281.364604][ T5664] EXT4-fs (loop2): group descriptors corrupted! [ 2281.442334][ T5688] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2281.449410][ T5688] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2281.464455][ T5688] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2281.475008][ T5688] EXT4-fs (loop2): group descriptors corrupted! [ 2281.514011][ T5694] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2281.521116][ T5694] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2281.536709][ T5694] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2281.549045][ T5694] EXT4-fs (loop2): group descriptors corrupted! 15:36:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={0x0}}, 0x0) 15:36:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, &(0x7f0000000100)) 15:36:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000118000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:12 executing program 5: r0 = eventfd2(0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 15:36:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x800000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:12 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000020100000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x38) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2281.746317][ T5705] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2281.760561][ T5705] EXT4-fs (loop0): #blocks per group too big: 32785 15:36:12 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x123142, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) dup2(r0, r1) write$apparmor_current(r1, 0x0, 0x0) 15:36:12 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x5450, 0x0) 15:36:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000128000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:12 executing program 5: r0 = epoll_create(0x8) close(r0) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000180), 0x0, 0x0, 0x0) [ 2281.828536][ T5710] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2281.845804][ T5710] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:12 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) ioctl$EVIOCSABS0(r0, 0x5451, 0x0) 15:36:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x900000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2281.889067][ T5710] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2281.905115][ T5710] EXT4-fs (loop2): group descriptors corrupted! 15:36:12 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x29, 0x46, 0x0, 0x0) 15:36:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x225c2, 0x0) write$P9_RWALK(r0, 0x0, 0x0) [ 2281.966297][ T5733] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2281.976483][ T5733] EXT4-fs (loop0): #blocks per group too big: 32786 [ 2281.976531][ T5731] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2281.995466][ T5731] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:12 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, 0x0) 15:36:12 executing program 4: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 2282.007467][ T5731] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2282.021799][ T5731] EXT4-fs (loop2): group descriptors corrupted! 15:36:13 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000110000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:13 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, 0x0) 15:36:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000138000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:13 executing program 1: r0 = socket(0x2, 0x3, 0xf9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5451, 0x0) 15:36:13 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f00000010c0)='/dev/vcs#\x00', 0x2, 0x0) fcntl$getown(r0, 0x9) 15:36:13 executing program 1: r0 = inotify_init1(0x0) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/autofs\x00', 0x0, 0x0) dup2(r0, r1) r2 = inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x8200081d) inotify_rm_watch(r1, r2) 15:36:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000640)='/proc/thread-self\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2282.253436][ T5767] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2282.269772][ T5767] EXT4-fs (loop0): #blocks per group too big: 32787 15:36:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xa00000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2282.355126][ T5775] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2282.364541][ T5775] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2282.382175][ T5775] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 15:36:13 executing program 1: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0xfffffffffffffe06) 15:36:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000148000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NLBL_MGMT_C_PROTOCOLS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2282.459883][ T5775] EXT4-fs (loop2): group descriptors corrupted! 15:36:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) recvmmsg(r0, &(0x7f0000001940), 0x173, 0x0, 0x0) r1 = dup(r0) r2 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x401004000000016) 15:36:13 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000120000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) [ 2282.645994][ T5801] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2282.673756][ T5801] EXT4-fs (loop0): #blocks per group too big: 32788 [ 2282.765716][ T5810] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2282.774670][ T5810] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2282.789974][ T5810] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2282.800789][ T5810] EXT4-fs (loop2): group descriptors corrupted! [ 2282.913923][ T5817] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2282.945865][ T5817] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2282.981562][ T5817] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2283.012356][ T5817] EXT4-fs (loop2): group descriptors corrupted! 15:36:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x77359400}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) r2 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12}, &(0x7f0000044000)) r3 = dup(r1) sendmsg$NLBL_MGMT_C_ADD(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) 15:36:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x2008c815) 15:36:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xb00000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000004178000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:14 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000140000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:14 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x1, 0x0) dup2(r0, r1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)) [ 2283.334897][ T5836] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2283.343726][ T5838] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2283.356079][ T5836] EXT4-fs (loop0): Invalid log cluster size: 67108866 [ 2283.366868][ T5838] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) [ 2283.386999][ T5838] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2283.409413][ T5838] EXT4-fs (loop2): group descriptors corrupted! 15:36:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x1b5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4$packet(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 15:36:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000004188000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2283.549784][ T5851] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2283.594202][ T5851] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2283.631829][ T5867] EXT4-fs (loop0): Test dummy encryption mode enabled 15:36:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xc00000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:14 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) close(r0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) [ 2283.639236][ T5867] EXT4-fs (loop0): Invalid log cluster size: 67108866 [ 2283.648680][ T5851] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2283.657456][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2283.676631][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2283.688601][ T5851] EXT4-fs (loop2): group descriptors corrupted! 15:36:14 executing program 5: r0 = inotify_init() ioctl$EVIOCGKEYCODE(r0, 0x5421, &(0x7f00000003c0)=""/166) 15:36:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockname$netlink(r0, 0x0, &(0x7f00000005c0)) 15:36:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) writev(r1, 0x0, 0x0) 15:36:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000004198000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:15 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000001b0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:15 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) restart_syscall() 15:36:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0xe) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x20000106) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 15:36:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xd00000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:15 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 15:36:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xe00000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2284.303544][ T5906] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2284.310621][ T5907] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2284.322559][ T5906] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2284.334760][ T5907] EXT4-fs (loop0): Invalid log cluster size: 67108866 15:36:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0xe, 0x0, &(0x7f0000000040)) [ 2284.369831][ T5906] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 15:36:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCSREP(r0, 0x5452, &(0x7f0000000340)) 15:36:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 15:36:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) tkill(r2, 0x1000000000016) 15:36:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5c}}, 0x8c1) [ 2284.411462][ T5906] EXT4-fs (loop2): group descriptors corrupted! 15:36:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000041a8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2284.589923][ T5920] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2284.597569][ T5920] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2284.622973][ T5920] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2284.642494][ T5920] EXT4-fs (loop2): group descriptors corrupted! 15:36:15 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000001c0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0xf00000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000440)=0x400100000001, 0x4) r1 = dup2(r0, r0) socket$unix(0x1, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) connect$netlink(r1, &(0x7f0000000000)=@unspec, 0xc) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={0x0}}, 0x0) 15:36:15 executing program 1: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x0) 15:36:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) syz_open_procfs(r1, &(0x7f00000059c0)='net/unix\x00') [ 2284.704643][ T5951] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2284.711590][ T5951] EXT4-fs (loop0): Invalid log cluster size: 67108866 15:36:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000001b8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:15 executing program 5: getrusage(0x1dcf55d93b3099cd, 0x0) 15:36:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x2) write$P9_RXATTRWALK(r0, 0x0, 0x0) [ 2284.895572][ T5971] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2284.908240][ T5971] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1000000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:15 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2) close(r0) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @dev}, 0x10) [ 2284.987847][ T5987] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2284.998208][ T5971] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2285.044646][ T5987] EXT4-fs (loop0): #blocks per group too big: 32795 [ 2285.066169][ T5971] EXT4-fs (loop2): group descriptors corrupted! [ 2285.220270][ T5982] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2285.230298][ T5982] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2285.261083][ T5982] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2285.277415][ T5982] EXT4-fs (loop2): group descriptors corrupted! 15:36:16 executing program 4: r0 = socket(0x1, 0x5, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 15:36:16 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 15:36:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 15:36:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000041b8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1004000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:16 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000001e0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 2285.482337][ T6019] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2285.494160][ T6025] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2285.509073][ T6025] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2285.512191][ T6019] EXT4-fs (loop0): Invalid log cluster size: 67108866 15:36:16 executing program 4: r0 = socket(0x2, 0x1, 0x0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0xc010) 15:36:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x7, 0x0, &(0x7f0000000000)) [ 2285.525414][ T6025] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2285.567263][ T6025] EXT4-fs (loop2): group descriptors corrupted! 15:36:16 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) r1 = signalfd(r0, &(0x7f0000001400), 0x8) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000003080)) 15:36:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1100000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:16 executing program 5: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTAT(r0, 0x0, 0x0) 15:36:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000001c8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:16 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000001f0000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = syz_open_dev$char_raw(&(0x7f00000000c0)='/dev/raw/raw#\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) 15:36:16 executing program 1: r0 = epoll_create1(0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 15:36:16 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) dup2(r1, r0) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 15:36:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) dup2(r0, r1) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) 15:36:16 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) ioctl$FIOCLEX(r0, 0x40049409) [ 2285.830854][ T6056] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2285.849915][ T6056] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2285.867925][ T6056] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 15:36:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, 0x0) [ 2285.878364][ T6056] EXT4-fs (loop2): group descriptors corrupted! 15:36:16 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000080)=0x80) fstat(r1, &(0x7f00000000c0)) 15:36:16 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) read(r2, 0x0, 0x0) [ 2285.939287][ T6068] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2285.948337][ T6068] EXT4-fs (loop0): #blocks per group too big: 32796 [ 2285.963995][ T6083] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2285.972039][ T6083] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x1200000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x5452, &(0x7f0000000080)) [ 2285.990203][ T6083] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2286.003994][ T6083] EXT4-fs (loop2): group descriptors corrupted! 15:36:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000041c8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:17 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$CHAR_RAW_DISCARD(0xffffffffffffffff, 0x1277, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x0) 15:36:17 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000200000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x2, 0x0, &(0x7f0000000000)) 15:36:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2000000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:17 executing program 5: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$EVIOCGBITSND(r0, 0x5451, 0x0) 15:36:17 executing program 4: r0 = epoll_create1(0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) close(r1) socket$inet6_udp(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000280)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 15:36:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8902, &(0x7f0000000040)={'team0\x00', {0x2, 0x0, @empty}}) [ 2286.253700][ T6105] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2286.275907][ T6110] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2286.283029][ T6105] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2286.304703][ T6110] EXT4-fs (loop0): Invalid log cluster size: 67108866 15:36:17 executing program 1: sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, 0x0, 0xc5bc1564a5a4ec1b) 15:36:17 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000740)='/dev/vcs#\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 2286.344797][ T6105] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 15:36:17 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 15:36:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000041d8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:17 executing program 1: r0 = memfd_create(&(0x7f0000000000)='wlan0(\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 2286.387682][ T6105] EXT4-fs (loop2): group descriptors corrupted! 15:36:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x5450, 0x0) [ 2286.554952][ T6139] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2286.568149][ T6119] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2286.581237][ T6139] EXT4-fs (loop0): Invalid log cluster size: 67108866 [ 2286.607090][ T6119] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2286.626627][ T6119] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2286.641877][ T6119] EXT4-fs (loop2): group descriptors corrupted! 15:36:17 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000010200000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:17 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000a80)) 15:36:17 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x29d1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0xe, 0x0, &(0x7f00000000c0)) 15:36:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2000c040, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) connect$unix(r1, &(0x7f0000932000)=@abs, 0x6e) 15:36:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2010000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000001e8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x5450, 0x0) 15:36:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x842, 0x0) write$cgroup_devices(r0, 0x0, 0x0) 15:36:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$9p(r0, 0x0, 0x0) [ 2286.839113][ T6159] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2286.848243][ T6159] EXT4-fs (loop0): #blocks per group too big: 32798 [ 2286.875189][ T6169] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2286.895899][ T6169] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2286.916139][ T6169] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 15:36:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0000e2ffff0acaffffff1f80e1fffffff300"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, 0x0) 15:36:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 2286.941995][ T6169] EXT4-fs (loop2): group descriptors corrupted! 15:36:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2100000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2287.050365][ T6182] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2287.058588][ T6182] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2287.077083][ T6182] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2287.089080][ T6182] EXT4-fs (loop2): group descriptors corrupted! 15:36:18 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000210000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:18 executing program 1: r0 = socket$inet(0x2, 0x3, 0x10) write$P9_RLINK(r0, 0x0, 0x0) 15:36:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000041e8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:18 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, 0x0) 15:36:18 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 15:36:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x6c1) r2 = dup(r0) sendmsg$DEVLINK_CMD_TRAP_GET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 15:36:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) close(r0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r3, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) tkill(r2, 0x1000000000016) 15:36:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x40000) [ 2287.191120][ T6204] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2287.201761][ T6204] EXT4-fs (loop0): Invalid log cluster size: 67108866 15:36:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2200000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:18 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 15:36:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f0000000000000002000000020000041f8000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:18 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') ioctl$CHAR_RAW_SECTGET(r0, 0x1267, &(0x7f0000000000)) [ 2287.288983][ T6213] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2287.315350][ T6213] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2287.357265][ T6213] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2287.373231][ T6213] EXT4-fs (loop2): group descriptors corrupted! [ 2287.522280][ T6240] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2287.529177][ T6229] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2287.529450][ T6229] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2287.536204][ T6240] EXT4-fs (loop0): Invalid log cluster size: 67108866 [ 2287.599283][ T6229] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2287.613579][ T6229] EXT4-fs (loop2): group descriptors corrupted! 15:36:18 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000220000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(r1, 0x5451, r0) 15:36:18 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r0, 0x0, 0x0) 15:36:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2300000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:18 executing program 1: r0 = socket(0x1, 0x5, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) 15:36:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000208000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGRS485(r1, 0x5409, 0x0) 15:36:18 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, @mcast2}) 15:36:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) 15:36:18 executing program 4: r0 = socket(0x10, 0x2, 0x2) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 2287.749847][ T6260] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2287.777518][ T6260] EXT4-fs (loop0): #blocks per group too big: 32800 15:36:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000004208000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 2287.898736][ T6265] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2287.911358][ T6265] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2287.930126][ T6265] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 15:36:18 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) [ 2287.967521][ T6265] EXT4-fs (loop2): group descriptors corrupted! 15:36:18 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000250000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2400000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000003040)='/dev/vcs\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:36:18 executing program 5: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2288.034174][ T6289] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2288.041070][ T6289] EXT4-fs (loop0): Invalid log cluster size: 67108866 15:36:19 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x40, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c200)={0x0, 0x0, &(0x7f000000c1c0)={0x0}}, 0x0) 15:36:19 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x4000) 15:36:19 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, 0x0, &(0x7f00000000c0)) 15:36:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xb00, 0x0) r1 = dup(r0) ioctl$CHAR_RAW_RAGET(r1, 0x1263, &(0x7f0000000040)) 15:36:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000010208000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:19 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, 0x0) 15:36:19 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') dup2(r0, r1) setsockopt(r1, 0x100000001, 0x8, &(0x7f0000000180)="63cb7982", 0x4) [ 2288.229483][ T6309] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2288.236956][ T6309] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2500000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2288.317295][ T6309] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2288.348371][ T6336] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2288.355261][ T6336] EXT4-fs (loop0): Invalid log cluster size: 268435458 [ 2288.377739][ T6309] EXT4-fs (loop2): group descriptors corrupted! [ 2288.563531][ T6330] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2288.571588][ T6330] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2288.604538][ T6330] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2288.622997][ T6330] EXT4-fs (loop2): group descriptors corrupted! 15:36:19 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000270000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {0x0}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) dup3(0xffffffffffffffff, r0, 0x0) 15:36:19 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000002c0)=0x200, 0x4) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f0000000300)="81", 0x1, 0x0, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x2001, 0x0, 0xff61) write$P9_RCREATE(r1, 0x0, 0x0) 15:36:19 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup2(r1, r1) r3 = accept4$inet6(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f0000000000)={0x6, 'ip_vti0\x00'}) 15:36:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4024001) 15:36:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x2e00000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 15:36:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000218000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:36:19 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 15:36:19 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) close(r2) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r3, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 15:36:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2288.787854][ T6363] EXT4-fs (loop0): Test dummy encryption mode enabled [ 2288.803106][ T6369] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2288.816914][ T6369] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:36:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup3(r0, r1, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:36:19 executing program 5: r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) close(r0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) dup2(r0, r1) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000000)) 15:36:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x3f00000000000000, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 2288.832026][ T6363] EXT4-fs (loop0): #blocks per group too big: 32801 [ 2288.841115][ T6369] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2288.864486][ T6369] EXT4-fs (loop2): group descriptors corrupted! [ 2289.030440][ T6391] EXT4-fs (loop2): Test dummy encryption mode enabled [ 2289.043396][ T6391] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2289.078408][ T6391] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2289.101896][ T6399] ================================================================== [ 2289.110293][ T6399] BUG: KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor [ 2289.118169][ T6399] [ 2289.120509][ T6399] write to 0xffffffff882c3678 of 8 bytes by task 4886 on cpu 1: [ 2289.129357][ T6399] tomoyo_supervisor+0x176/0xb20 [ 2289.134502][ T6399] tomoyo_path_number_perm+0x227/0x2d0 [ 2289.139966][ T6399] tomoyo_file_ioctl+0x1c/0x20 [ 2289.144731][ T6399] security_file_ioctl+0x45/0x90 [ 2289.149873][ T6399] __se_sys_ioctl+0x48/0x140 [ 2289.154725][ T6399] __x64_sys_ioctl+0x3f/0x50 [ 2289.159305][ T6399] do_syscall_64+0x39/0x80 [ 2289.163716][ T6399] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2289.169588][ T6399] [ 2289.171904][ T6399] write to 0xffffffff882c3678 of 8 bytes by task 6399 on cpu 0: [ 2289.179526][ T6399] tomoyo_supervisor+0x176/0xb20 [ 2289.184463][ T6399] tomoyo_path_number_perm+0x227/0x2d0 [ 2289.189926][ T6399] tomoyo_path_mkdir+0x50/0x70 [ 2289.194682][ T6399] security_path_mkdir+0x95/0xf0 [ 2289.199612][ T6399] do_mkdirat+0xf7/0x220 [ 2289.203867][ T6399] __x64_sys_mkdir+0x32/0x40 [ 2289.208450][ T6399] do_syscall_64+0x39/0x80 [ 2289.212862][ T6399] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2289.218752][ T6399] [ 2289.221062][ T6399] Reported by Kernel Concurrency Sanitizer on: [ 2289.227214][ T6399] CPU: 0 PID: 6399 Comm: syz-executor.3 Not tainted 5.9.0-syzkaller #0 [ 2289.235447][ T6399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2289.245532][ T6399] ================================================================== [ 2289.253584][ T6399] Kernel panic - not syncing: panic_on_warn set ... [ 2289.260179][ T6399] CPU: 0 PID: 6399 Comm: syz-executor.3 Not tainted 5.9.0-syzkaller #0 [ 2289.268410][ T6399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2289.278445][ T6399] Call Trace: [ 2289.281735][ T6399] dump_stack+0x116/0x15d [ 2289.286061][ T6399] panic+0x1e7/0x5fa [ 2289.289954][ T6399] ? vprintk_emit+0x2f2/0x370 [ 2289.294648][ T6399] kcsan_report+0x67b/0x680 [ 2289.299151][ T6399] ? delete_node+0x42e/0x470 [ 2289.303741][ T6399] ? kcsan_setup_watchpoint+0x46a/0x4d0 [ 2289.309283][ T6399] ? tomoyo_supervisor+0x176/0xb20 [ 2289.314386][ T6399] ? tomoyo_path_number_perm+0x227/0x2d0 [ 2289.320007][ T6399] ? tomoyo_path_mkdir+0x50/0x70 [ 2289.324942][ T6399] ? security_path_mkdir+0x95/0xf0 [ 2289.330042][ T6399] ? do_mkdirat+0xf7/0x220 [ 2289.334448][ T6399] ? __x64_sys_mkdir+0x32/0x40 [ 2289.339203][ T6399] ? do_syscall_64+0x39/0x80 [ 2289.343796][ T6399] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2289.349860][ T6399] ? pagecache_get_page+0x849/0x980 [ 2289.355055][ T6399] ? format_decode+0x1d3/0x840 [ 2289.359808][ T6399] ? string+0x1f9/0x210 [ 2289.363968][ T6399] kcsan_setup_watchpoint+0x46a/0x4d0 [ 2289.370018][ T6399] tomoyo_supervisor+0x176/0xb20 [ 2289.374952][ T6399] ? snprintf+0x6f/0x90 [ 2289.379101][ T6399] tomoyo_path_number_perm+0x227/0x2d0 [ 2289.384560][ T6399] ? filename_create+0x36f/0x3c0 [ 2289.389485][ T6399] tomoyo_path_mkdir+0x50/0x70 [ 2289.394324][ T6399] security_path_mkdir+0x95/0xf0 [ 2289.399250][ T6399] do_mkdirat+0xf7/0x220 [ 2289.403574][ T6399] __x64_sys_mkdir+0x32/0x40 [ 2289.408156][ T6399] do_syscall_64+0x39/0x80 [ 2289.412569][ T6399] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2289.418449][ T6399] RIP: 0033:0x45d277 [ 2289.422351][ T6399] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2289.441947][ T6399] RSP: 002b:00007f954fc5fa88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2289.450377][ T6399] RAX: ffffffffffffffda RBX: 00007f954fc5fb20 RCX: 000000000045d277 [ 2289.458339][ T6399] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000020000100 [ 2289.466322][ T6399] RBP: 00007f954fc5fae0 R08: 0000000020000218 R09: 0000000000000000 [ 2289.474283][ T6399] R10: 0000000000000400 R11: 0000000000000213 R12: 0000000020000000 [ 2289.482251][ T6399] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000140 [ 2289.490976][ T6399] Kernel Offset: disabled [ 2289.495389][ T6399] Rebooting in 86400 seconds..