500), 0x3528ac06}], 0x1, 0x0) 06:27:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000003d00000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25240, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x2200, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000002340000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1300.915929] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1300.928894] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1300.939913] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1300.945620] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1300.955327] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1300.964272] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1301.089751] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1301.102479] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25280, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000002c40000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1301.192882] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1301.201706] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1301.201781] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1301.222066] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000007fff0000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1301.337177] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1301.357089] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1301.415208] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1301.422687] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1301.443693] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1301.451243] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1301.495490] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1301.503141] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x252c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000002d40000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1301.633255] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1301.653527] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1301.766846] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1301.777190] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1301.802437] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1301.819061] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1301.898733] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1301.912651] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1301.932004] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1301.943702] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000004280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYRESOCT, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c616c6ced99cedf746870722c00"]) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000006300)={0x50, 0x0, r3}, 0x50) write$FUSE_INIT(r1, &(0x7f0000000200)={0x50, 0x0, r3, {0x7, 0x1f, 0x1, 0x648000, 0xfffa, 0x5, 0x4}}, 0x50) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) read$fb(r4, &(0x7f0000000140)=""/188, 0xbc) ptrace$cont(0x7, r0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r1, &(0x7f0000000280)="74b734934e65f132535909728cff83972e664b32a6dce96afb05606c9244aa45e86f39699b68277a297e01ba11110459d8a3b2f948ba21f70e26e095b1aae2afa4e485f81edad6912dbf34f61dc6d0986fac697311ae70404b03621d40fa26213a04c83f8e25d53fbe08d3cc6ba10aafe2965d492b47cad9ab7ec0"}, 0x20) 06:27:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000020000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x2c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:05 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000006040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25300, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1303.996042] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1304.007482] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1304.021652] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1304.023549] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1304.038576] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1304.057029] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25340, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1304.261954] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1304.273298] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1304.282787] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1304.295779] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000041000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000040000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1304.416356] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1304.428957] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1304.542397] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1304.556700] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1304.578630] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:27:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000044000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1304.591818] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1304.603987] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1304.618189] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1304.831020] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1304.839339] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1304.956843] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1304.971431] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1305.057420] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1305.067956] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) prctl$PR_SET_UNALIGN(0x6, 0x3) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25380, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:08 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000070000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004b000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1306.994735] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1307.005707] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1307.052766] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1307.059771] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1307.068269] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1307.077346] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1307.088447] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:27:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1307.104549] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000f0000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1307.297245] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1307.307913] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x253c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1307.378923] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1307.392392] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000fff000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1307.532935] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1307.539831] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1307.541785] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1307.555282] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1307.643601] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1307.643742] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1307.659675] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1307.668210] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1307.675943] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:27:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1307.691300] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1307.822696] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1307.833236] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:11 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25400, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000100000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000002000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1310.059801] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1310.080008] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1310.090340] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1310.099711] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:27:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1310.128123] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1310.154432] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1310.326548] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1310.327022] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1310.350753] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1310.359029] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1310.370095] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1310.382002] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000009000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000140000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25440, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1310.789761] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1310.805430] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1310.813533] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1310.826554] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000210000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1310.835314] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1310.851296] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1311.109421] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1311.120297] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1311.164042] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1311.171869] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000140)="ec6b4c9400f59073fded63a0c3d1fe9e7b1506e6a52ec53a857b65d057b2f666931481a8d3b2d4d612699753bcfbac4a9bf9154866c11a3274f6159f") r0 = gettid() r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) wait4(r2, 0x0, 0x20000000, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:14 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000001e000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25480, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000002d0000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x2, &(0x7f0000000340)="5e486a858d1c968f98337dc46180ae5374291e3ae8ba1ae93c77afdc135d0d0dc6edf16e222d8baf722e0e1c4f265e3de894dff0daafe3cdde9f508c8e475a07cb8f13e0e403151d0c759ae806c2ea040caea3d465c7fec8bd0572058b2024853047e641e23ecdbe51325c40fd4ae0fe072bb415d37cdaf4ea6c8c8f1f4fae6b43a775e68c2df4c3ba7a1cebefd3534316b8ba552af2fac57fec951a428eca5f7976ec7145bc768e5dcdadf1b9ca48193565382291162bdb2aef8790bd28afb7cecc6ceddad0c38fcef6b6f1749e3af5a8e021f272639dcdfeff54493a43c38c7d42ffc1ea032346bba448c2d7d8e5b6f882e0bb884df9a5cf02a83f53f00857598d278265354f04f2667cf40e8465") ptrace$cont(0x7, r0, 0x0, 0x0) [ 1313.090476] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1313.101412] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1313.200543] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1313.221624] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1313.232022] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1313.239019] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1313.247828] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1313.259733] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000d00300002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1313.408116] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1313.408122] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1313.408185] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1313.423383] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x254c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000021000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1313.573039] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1313.580101] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1313.715321] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1313.722807] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1313.730125] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1313.738619] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1313.746660] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1313.751486] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000000250000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:15 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 1313.905904] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1313.906611] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1313.925687] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1313.944141] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000002d000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25500, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1314.039091] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1314.054451] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1314.116237] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1314.125700] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1314.240014] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1314.265353] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1314.295943] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1314.302863] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1314.309743] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1314.319415] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030200002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1314.461880] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1314.469127] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1314.639655] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1314.675650] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25540, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000041000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xc0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030300002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.current\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xe8, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010101}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x64010102}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_batadv\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'wg1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x40804}, 0x40408d1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x4000000000edbc) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 06:27:18 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000140)={0x1fe, 0x0, &(0x7f0000ffd000/0x1000)=nil}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x109480, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1316.308398] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1316.333861] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1316.384319] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1316.393047] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1316.405262] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1316.415343] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1316.429552] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1316.451662] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000044000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1316.638370] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1316.654945] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1316.663493] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1316.678864] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030400002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25580, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1316.861846] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1316.868733] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030500002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1316.977443] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1316.985017] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1316.997516] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1317.011195] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1317.014381] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1317.042684] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004b000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x6b6b6b, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x255c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:18 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 1317.198412] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1317.209062] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1317.272764] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1317.284284] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25600, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1317.338136] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1317.363789] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1317.370702] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1317.373033] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1317.482856] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1317.492128] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1317.589498] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1317.612304] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1317.755266] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1317.773066] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000003c000000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030600002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25640, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$binfmt_aout(r1, &(0x7f0000000140)={{0x107, 0x4, 0xb1, 0x304, 0x3b9, 0x80000001, 0x379, 0x3}, "c03d7fb9266d0db08a32a3520568cf86fe13f18549da95bfcd95d5700e223b08c5336d67a407deec952ef221e11a71e9e912ea28eaa7329538a1f3a87f7486dabb1e836eccfa317250e5d8aac920d2421f8c7385dcb396dd5173f77bbad64ba3f5d9e65b8601683d77", [[], [], [], [], [], [], [], []]}, 0x889) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:21 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 1319.478620] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1319.488218] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1319.490547] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1319.502374] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1319.517583] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1319.526903] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1319.699343] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1319.715558] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1319.718024] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1319.729237] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1319.746892] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1319.757757] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000010000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25680, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030700002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1319.950917] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1319.959480] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1320.006924] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:27:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1320.051216] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1320.087688] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:27:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000020000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1320.100693] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1320.108820] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1320.126418] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030900002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x256c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:22 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25700, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1320.312695] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1320.313900] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1320.343775] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1320.378984] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1320.479492] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1320.487485] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1320.525336] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1320.532756] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1320.612183] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1320.628761] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$phonet(r0, &(0x7f0000000040)={0x23, 0x2, 0xca, 0x4}, 0x10) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r2, r3, 0x78d5}) 06:27:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000032100002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040020000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25740, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:24 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 1322.521273] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1322.540257] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1322.548128] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1322.561093] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1322.641701] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1322.654293] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1322.676649] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:27:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000032200002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1322.693734] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1322.741339] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1322.755698] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25780, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1322.881639] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1322.888607] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040030000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1323.028612] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1323.051006] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1323.054744] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1323.077628] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1323.090099] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1323.093171] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000032300002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1323.305256] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1323.327024] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1323.335520] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1323.343519] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1323.497127] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1323.507907] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1323.658840] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1323.668522] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002640)=[{&(0x7f00000004c0)="92fad861081bdd8b727f640430b11dd221a791a8ac56c8c44053f3b48917b568bff4ee3f9533192352e394aee0486078aaea7fd8b6bbb84a17ad9d2cf72d486b4baa7d9f57f0535686ddcf97d680a975cda9160ce1c0c1cbc548f79d3709811005b26c70ea95b1f3a4af1f3a413bfda02ad5ef8213c6216dc7f75e11d8a24b32afb786f10b5adf7298f22d399eb4000717fb76a828fa52c76ffc3ea736a86fa8a9c3189cf0d53146c4891014a824da75ad5598d5088516f624bf2242795ccc36cb1801a1f5237f71b39f1951eb89a0bca09d174d900b2e9031fe3b0c4a7cca86dca9fbe7444f7a666b09849876bcd2acaf46d16367bd9d1f865a32d40e89ed6ddca39c63c451e9fd41499e71d8e486a0216e44691bfd29fdfdc75a9c48b345a82854440f52d482fd58cb50bca877754b88d79d947b776fc2d30ff9fc925725a2667fe59d986af9cfbab49bf20d820fe1512f041e834807b4a54eddb18cdffa9bcea22cfc5cb7843c6d20b75c72c0bfb61c78867cf24c1edc561cdf1b86c67de87581d8787acef0cb7914019474b2d8d5b9eee57397fdb19fbf8de98a22a2b9eb605202d26de93f5515ce252532f79d0bbd1abfdaa147020f718255bbb3095b5cfebddb33436a0272f536efe654038ff6e99ed0cc8331b6dfdc42b29e641bb8d8be03d76d6aca7208668c2cc6063197a149ca95dbc5a2c4547c97e1bfb8a13f1158cac24530965428d73a963b5580a6ea8578d51e3ad7545d8faddd1667646c974d2fca7a381de1fe2ffd628a03d41c5063f6c8faedfcda2b37d68fd8bdcfe91bd752ac4c79162d1ddfae7a20307a79e6706663b925d520088e9b766324b05fa1dc2a900c3960d3793409530e62a9b11b425f4ad952247cc49060d5407427287eab0ab71bb00b6f70c0eacbbf64e63f27d2f4598f33321908781741f8c2bc1e2480378d3d64ea53387d8e25c00acc188694765ee3932fb4059d0d6b5d2fb307a3bd2a8ba96f523aa7be90bc96f7b1a98631ed40eff964d8c9695447c888a0353fae708fdc2663a34fd20a7c50526522d0d434abff68bc92e104a433636f75da4064626686b1f6e888dd8cac8ae49217ed67f19fcbcb478d79e7fa7c0f9822b671038719ca41b94908fda9fec99f07210c34657d5a8667ae13fc6b0aac07ce5bf9fa5edd0c4968634534bc6e0695907b9862a9b6140a1636b478118289a91de8568a0cc9280b0ed262522c0d4f47aa5180102094ac0a635ed1418ea69bc1a852da70866f9daed422d490e01d7db8ea72b156499e33931fce427fbae65d178989a5a6b792f2f92d02d3bc14094e7bd19e7053845510856b9ff9875a40b1a00567e728c172ba9b176b22255569dd1dee6a231c44a67df58d2f90c39dac425d74991e070a66babeea2f51de6be8bb7b6076ee2d93e327d9d80363dcbb959ef30c508322d60719e9a711a7b029ca665a0c81985a243c08cdb305590a3248609440ee15aa4324e336cdb983afd7e0d1132819a00fd3539dfbf899254aaf4863e458dfdf100bd3e724f96f149f283110de9e70a4c38f3aa3af0dbcdfdc167c26a7d4a1d46325eee6aa5f3e0dee0e4cd8094f086ecf5f2b04ff5f6b620f304374b3b4419eb0da9bccc9ec618ecfa319aa6fddf8b5d038815c9a88005aaa1fb9db4ca1054a040296184ac13cadf0fada17d89170f90b0a71b7c71a35906f33772effda737a9ae3918f7159e5d303da69a25a5120aa46739bc5df17dcfc83fa95de05456d152ed460568964feef7b8e5d10299c9c6c13619999edd7f2a8681f64aa789a85f625bbd148112d1080f1017ca06a0b92e5f980ba9a489eacafb41b86f91961b03fc2e5cdab5a075bc4eac6c940123ec61f02ea321e470e9723d7f6a068714867c7119fb079019f476b30c6ff9bc80729b314bb0b3ba4b7db73b9d38ca086b9ded5062a16eb9998959a6c89a061b9bec209c603f0ba2e38d826076b1ee4fbc0c10bf5e92a6dbd4868680c0df9e37cd5c076032d35213478ff5df9d94f2078cbd7f313ae45cac4fdce341719264e6bc83a68f4ba16a02e8075b4bf72838434c1e7fb06d5337cc59a7c88bd7d82bfd9505b839b2f8f9cf3d02b2662a9762a4aac2c9130b610499901eb6cdda1784ec878f7c35ecc07f37557a77daa62ec759ab2424223a55393c7efabafbc726edf7b160ad87b7bcc56b3b12697da31b21ca5d2f2bba66b3a55b2b4c1d2041ef8a3e88385cc836962c3398a981e61960926b4ab5dcd2968a5f0097760768ec0b21cc9e837955bf5c6895204032426c565f2a7198a4b8a1cd4f4e3b55e8b9d8439e6ad075138f94232e39f9ff1a0cdb5e935a1a8d36d4cebe62788e7bb88fee73c310c1461d0df49862666576eb3185470de3c5cb4d082d7155a1aa38d9e862aea2ebee96f9a824d52f4d881dcaa4a9340cd230d9d9d8de3a1c1006d8e64c30b4b8dd43d2fb65a32d933dc31fd8bb801f236731bef0b5e36fc5988545efac97b53e6084362fdcab112aad29a5b968c967cc4efcec3fbc6f4e452b5b20597788579c4060bac4e4d945d1aaefc801be234a16eb9ef91a5bb0d0b3eaf9985297243d40d6ec67c392e4230196d8eb044cd9afcfee95699b3a0e3c0eb27377914acbfa632c35017712ec30292c7fc1fc996f26a2ab64ede5c512c3dd8b66384f425a265d0fe39fe83cb44b71d93906513a6237e52475d46141ec6ee8debfa63dc6797f5fb7367c7d6577e092d351f0a937e9f50ae7a74dc72708fc388c6adc29e7a17ef39e5650fc98c8d13b911f617467112cb70e89cbe76c59839eb8c6d1c4834ebf5f98be61663a07e9dcff9d99395cfe1f0464e9548259f859f977c459a0999b2e46f0b3491f339935830d288b257d4199cccb1df3675ac0f7cd7a8a0ce73b0b2e5e88d2936b7b6dd9513d32a67c40afb09ae85ee06b323801122b52a853d9965f47abf14732cd44ba9fe0edabfe7d3e86e1fba9a57adef3f8cca1b59fb8de645e8c576e01af880a8d73643ceb52477993441e506933b168257c98273abdc3c05d1e640c1275ad81e83f189ddfa5f26d8be0aa2f0f5a5ef069969d1546369329fc766d6cc2ac97e808928178318c57270bea9a7d134f13ffd6e13a59696985330bc1a96b10a38673619158cc9d2e864e00a965370b099e56182f66f7081b4caaaf978783ad5b7b9f77cd88a7e0ee9fd1e2096a15f53624e86a525b6b561927d0b13fd5baf66286e26ab06eeeaf8b25e0a9020cbc00514ca4eee73d35f263982be485ab5207ab9c3fe045458844b1806f08009f62ac6c49a579e9680618e2ad05589ddebb5a560e6fdb3ee53b2b63d3e8b9b6895ae20d162d0a532536dd5896327ce77631c97225f01ea5e6477ef8724630ad79339dce0ec65fa8ce849662da9f15e3b4c9254e0d0739d05c6028e8e11dd738bd5d166e367e35c328a0f076da3fbe62cd11f2923e8202007f8819930032e9db1bd6f80cbad3e6cb1609198c58419a381fabf4263b5428f360fc45f2d8bbe5b7269750e5c65a50ed07810bef78bc9b008d052f47cdd9d7e1587d48427d849fd41d6be4ef37ea78567d3ed5a7580f31994fd6935abe158b4db45c149e031ceb98d723722d6b731ae71b3b08972ca4e447685da8992a1dd07ff69eaa5984c4d2f30f773974052fce991c274cd7f03fcea0cf00d8e67423727986f13f75d0cc09cd77334da44e686953033edbc50ef23faa79d27a15965bb0077ba05c4a9a300f480579a924431dbd992ff32ea9f3a0a4b9801caf092bd8278cdb6500e7029b29fe32953467861e19652304c4027f3055732a048fe3b2e11e16b0d4af7da55111ba0c729cc186374ea3b60f30f7f75ebf41392d76700738474b08015b50f5fb85a89878dfb59e50c0b12a9bba19b325ca49c3390cfe67ae89698ad736fe5d04ad453f9c5f8e38277064f6aea3db6c79fb0d30e0188cd7408cf9cebecb2cce63e9cc165325b75a84f6b5971dc5a9c11ede84f3e7d708a0cd1473b3a8599ed52d4e597e635746ff424d47670ea9f704245c5a76acd2b5038ced5740fd05ecb9e24928b6b4370dcede75dde4dd0a674691fbef787d95c486b918c831a2ba01a5a8043c667a23b6ca7532fd4d7e13e4668eb5aaaa1d2535542362f31174b4bf190ba1442c2c88e8aea5c18f82f457adec6b2908b99ceb42d7515cfea05e6897fb38f6eede1c01a610bd44334d8e2d45a0224897ebd5f4b2b1a4ed34fb2507b34e280c3884d6eb854656e105cfae7435e00bdf4a71cdc6ecbcd8212d2143749b278a6e87a6d9a7336cad71b20a7b5e013e0b677a57222e9e004a27effd1031a41e564506d438ecc350be1b92f2e84b237e68ac09781a89611b738857a1ed109e55a6c6052c44dd9d52f1ba1bf4bf87d25b703ddb5e9dab2520c723a5b4af41277b93f869c66b9c0a9f7bd36a8626a46dfbeb8b890f5a1ee5134a1c3a29f97b1d74222ad302fa9af147a1a024034a49e6a699ef6c9a0f135dd4aaf5398bf7c798b94981c521e3812a5522cc7f2a6e5cb4fed7ac6044f502fd0c211f4870c26a3879f628a03bf73139ab30b4503d8c13679a2ae370b15831a801c0c4cfe3a9c8c775af6a4e0184fa37d06f3e1d3829df0b53f2e18c5523d0176d6dd3bc7ad08576c11a0a11dfa6354d0ad63d5421e555f3db8d0d988c36bd5a247ac42296b9e903625fc563ecf3f3b4d54efdedff2e182902dd978e345ab8e3fb97f913a45e39411f0401448247c017b1dc34a2e35bf6c3b42ff0894e2943454bec5b34f33bbdd4e6f8b57d67be1be34ca13c2a44688aad9166913949def8735b1c75a219415372d1d5b791ec3501697a19ffb357ef933c2c52b72ecad9f33bce5c1553dc6ce92f13f4e36dcff156029021e25c4835eedbcd05a40871f49884a7427a1d7c204b1697380063248bf2d1db81ff04258b29a0ca75e5a11dd1cbc7f2b3f8e602e78dc91fae6749eae51efc1d44be123e079e3f562b5a046b26ca5e6b33625f91ecd8e80705370db8ee0c8ecd2efd66b0d28e71e1fa22b3aecae90cae57c4dda28a8d412cd26beba49ddcde1768be01a0b3ff9925bae7b139d1a6a569b283e912f6e166411f061c651fdfff3aecadc8c21884295cee4e730249347cefe30955e667f72e5e12a79762e55cafe2bd9e65a0413cebe04e631c9f965c1c2d7491294a760c98f3e67d756226a2492166bf788a5474c1db7def2fbc65961cdcf261a190688df8e2e257d3739877463d78781a13543f34af41c041fb7b1686d9c3c7a70b896d5a7fc56f6a641e0f28008aad0034209e370212c10fbd3361161bf7cc28fd9098add2f558e89ba8c3036992d7fc305cde34530f0b01590e32e397028e4a0a05a04778d7f08be7ec512f7127a28cbdee91d7cfa3758bf2cbdb18bfec777e291b0af8781a9a5ebae004843d52b7f259c5f2277c00431d33e635ee9edc38a1bb798b65489008e94634197714a7cfbc12e1f23559229b6b3035373d6d1ea91899479f553356f02e2947963f431d372b4b4c5bd2ab6bab23ce204f811ab6d0252f8944af3ba5b24000934b216b1b52805762af1f668b74a1c01b0aade12a8a53d6b39583c5ecb271777c8d57f91195550d873c3218d36ba60cb6edb32288ad6b45c139162d54bf3800076e532815fe1c0f8636fec1110ea9495c815a44862cc6518793601cb9b4ad34ceacdb201bab141890dcc5009a1413c28ee4916f8ef6b469197be229466ccaf2af10d315896ec68fe8d16d4d1cd062708070f871fb351ebd08f5290fc0169a07f59db6a", 0x1000}, {&(0x7f00000014c0)="d0952cbc57e5dbba8208", 0xa}, {&(0x7f0000001500)="83648cae9d78f11c5e35a3df242d253235cee66a949b8d19092a46410008274ba86f76198fbd9f94a903054494cc3f46c5a7559eb17b9814f561a9ee90244349717fae9b5d89d88a507475fc1aafe56e9d8b880e91f126a5a2366fc21b748a4e3ef04757738c8e02e7ca7d9c1901a458a8ee34", 0x73}, {&(0x7f0000001580)="ce262146fc4babbf96d4af2678bcd04b58a54b07ace9b5956d060c0fe4dac72bd296480715ece5c238bd7b93f38821c1f2ae54e8660dfeba5a2c0f40ea72ac6597ede0be96112daeb89cd91cd3b7ca689cfa7687d97bc39d51209e7990a18984e1b23f98858460935ea96dd206a4fed435132bc8744708fb871832f0b793f4b3ff74bd0cfc3dd790bb9ae66e7ee3da1f09ebac7364750f38a119a10327917b80be210c0e4a33c35367965a1a6f", 0xad}, {&(0x7f0000001640)="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", 0x1000}], 0x5, 0x0, 0x0, 0x4040000}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x220}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=@ipv6_delrule={0x80, 0x21, 0x10, 0x70bd2d, 0x25dfdbfb, {0xa, 0x20, 0x80, 0x7, 0x4, 0x0, 0x0, 0x4}, [@FRA_SRC={0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x24}}, @FRA_DST={0x14, 0x1, @remote}, @FRA_DST={0x14, 0x1, @loopback}, @FRA_SRC={0x14, 0x2, @private1}]}, 0x80}, 0x1, 0x0, 0x0, 0x40004}, 0x4000) sendto$l2tp(0xffffffffffffffff, &(0x7f00000001c0)="52bce43c9b72a03698d84286789125963a8d4d2d07dbe3bc8df35c276be03887b609a9da2752ab5e83884fb73611156709d8a6a0cb60e180fd58f9ba0695db1d746c89aceb65c06fedd4b511b766a7eb2c34ed3b1c854389dc7db366bdea761e2bc7", 0x62, 0x4000000, &(0x7f0000000240)={0x2, 0x0, @remote, 0x400}, 0x10) process_vm_writev(r0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) accept4$unix(r1, 0x0, &(0x7f00000002c0), 0x800) tkill(r0, 0x40) r2 = syz_open_pts(0xffffffffffffffff, 0xe0800) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000180)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) r3 = getpgrp(r0) ptrace$cont(0x7, r3, 0x0, 0x0) 06:27:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040040000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:27 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x257c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000032c00002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1325.639864] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1325.647191] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1325.673844] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040050000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1325.685541] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1325.695591] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1325.718234] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000032d00002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1325.903329] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1325.911883] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1325.922234] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1325.925610] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25800, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1326.050734] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1326.063582] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1326.181479] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1326.187502] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1326.198679] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1326.198685] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040060000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1326.331286] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1326.338441] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1326.361749] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1326.370805] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1326.514974] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1326.525368] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1326.530784] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1326.542571] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1326.669600] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1326.681962] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r1}, 0x8) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000240)={0x2, @pix={0x3, 0x8e81, 0x4c314356, 0x6, 0x208, 0x4, 0xa, 0x6, 0x0, 0x0, 0x2, 0x1}}) tkill(r0, 0x40) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/null\x00', 0x1, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) ptrace$setregs(0xf, r0, 0x0, &(0x7f00000001c0)="28bd39d22cea69b2e71f1f5ac843f92e17a58323e8281686950e1577bda32a42a1dc975eb9f7494161f68c6a728bfd8a88df4934e72fe60b7f72abdc2401bfc2bf365f754a68") ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040070000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000036000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:30 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25840, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x32) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x8001, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x37c, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 1328.715275] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1328.722484] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1328.729451] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1328.745169] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1328.760157] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1328.767850] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() getpid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$setopts(0x4206, r0, 0x20000000000, 0x100000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x22000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_FLUSH_PMKSA(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x0, 0x53}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000040}, 0x400cc00) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0xc000, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000240)={0x1, 0x4b, @value=0x7}) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) getpid() [ 1328.899811] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1328.908048] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1328.923579] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1328.933071] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1329.011705] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1329.024078] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040080000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030003002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25880, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1329.271013] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1329.287534] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1329.368582] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1329.375958] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1329.386289] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1329.399210] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1329.461225] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1329.468970] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:31 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 1329.525915] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1329.533116] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040090000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000031004002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x258c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1329.806092] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1329.819022] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1329.841654] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:27:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030005002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1329.856616] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1329.891161] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:27:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x2c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1329.947429] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1329.957050] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1329.967522] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400c0000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1330.055087] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1330.093962] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1330.162035] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1330.168899] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1330.331028] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1330.346395] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1330.444723] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1330.464773] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.current\x00', 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000040)={0x6, 0x81, [0x2, 0xc19f, 0x4, 0x1ad3, 0x1], 0x2}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030006002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25900, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:33 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040210000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1332.131242] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1332.148475] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1332.159328] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1332.170352] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25940, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1332.179680] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1332.179921] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1332.388366] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1332.397570] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1332.407680] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1332.414755] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040220000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1332.437462] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1332.446954] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030007002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25980, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1332.681512] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1332.699676] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1332.777720] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1332.790902] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1332.808307] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x447af397, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1332.825547] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1332.836404] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1332.843470] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1333.018802] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1333.027103] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040230000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:36 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030009002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x259c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1335.170002] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1335.198530] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1335.227844] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1335.247566] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1335.268788] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25a00, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000402c0000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1335.334667] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1335.532543] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1335.539711] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1335.544107] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1335.555811] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1335.570233] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1335.590885] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030410002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1335.754585] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1335.764136] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25a40, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1335.869659] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1335.880260] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1335.886010] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:27:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1335.920380] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1336.092566] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1336.099446] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1336.117582] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1336.134910] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1336.207795] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1336.215133] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/102400, 0x18ffb}], 0x3, 0x0, 0xffffffffffffffe1, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000402d0000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:39 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, &(0x7f0000000140)={0x1ff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030020002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25a80, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:39 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x6b6b6b00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1338.219163] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1338.234869] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1338.237715] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1338.248000] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1338.255761] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1338.262627] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1338.403068] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1338.411941] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1338.430726] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1338.438356] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1338.446415] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1338.458051] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25ac0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030021002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040600000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000300030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1338.765125] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1338.772465] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1338.782568] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1338.791366] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1338.804332] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1338.820590] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1338.978084] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1338.981228] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1338.992143] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1338.998242] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1339.012704] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1339.025664] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:42 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0)={0xffffffffffffffff, 0x80000000, 0x1, 0x100000, 0x0, 0x0, 0x6a}, 0x0, &(0x7f0000000040)={0x1ff, 0x0, 0x20, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fremovexattr(r4, &(0x7f0000000080)=@known='trusted.overlay.impure\x00') r5 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030022002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040100400030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25b00, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1341.259238] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1341.272038] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1341.278697] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1341.288107] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1341.295839] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:27:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x200000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x10, &(0x7f0000000240)={[{@index_on='index=on'}, {@metacopy_on='metacopy=on'}], [{@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xcb/.'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x4, 0x0, 0xa8}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) [ 1341.322369] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000040)={0xff, 0x35315258, 0x1, @discrete={0x5, 0x8}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000140)="920e29557262596f504a66cb72c4c75b6a1f5f2015401f5152be9fdce680e60a463c29d0af91d00729cf5bde30fdf43324b0006c4d94382ed9a5ea347aa2fa265314b1aa32e2f025278db8a50b5e7f3e7e31c6d04d1e074b2a93b1ad0917445eabb0a1445c2b126cab9dce275adfd9c53cb90900767e8b43ea3c9a559fd92af427f68193eca33f71a7acf38950a7ef6efc552922c132747ef0cadb975ceb0dcca0be6028a1b65691e6207293dc6cd1e4c4df619de5cfdc") ptrace$cont(0x7, r0, 0x0, 0x0) [ 1341.470312] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1341.477740] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1341.491716] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1341.493492] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030023002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000500030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:43 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x100000001, 0x20000) sendmsg$AUDIT_TTY_GET(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x3f8, 0x200, 0x70bd28, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25b40, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x20, 0x70bd25, 0x25dfdbfb, {{}, {}, {0x8}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x48010}, 0x800) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1341.735222] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1341.760100] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1341.762190] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1341.784964] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x97f37a44, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1341.891103] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1341.898706] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1341.908266] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1341.909881] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1341.931024] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000600030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1341.988758] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003002c002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25b80, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1342.240990] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1342.258605] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1342.265782] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1342.277363] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1342.380310] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1342.387441] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1342.425773] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1342.425860] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1342.449834] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1342.456178] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:44 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r4, 0x110, 0x70bd25, 0x25dfdbfb, {{}, {}, {0x14, 0x18, {0x3ff, @bearer=@udp='udp:syz1\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8800}, 0x4000085) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0)={0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000700030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003002d002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1342.601062] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1342.612745] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25bc0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:44 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x7ab1}, 0x0, &(0x7f0000000140)={0x3f, 0x0, 0x0, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x4}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 1342.808397] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1342.808915] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1342.823389] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1342.837865] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1342.928023] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1342.935599] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1342.959072] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1342.970624] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1343.079493] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1343.086766] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003003f002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25c00, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:46 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snd/seq\x00', 0x8001) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000800, 0x10000020000000fb], 0x100000, 0x200400}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r2, 0x4018f50b, &(0x7f0000000100)={0x0, 0x1ff, 0x8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000140)='threaded\x00', 0x12000005f) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000040)={0xffff, 0x4}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) openat$cgroup_ro(r0, &(0x7f0000000080)='freezer.self_freezing\x00', 0x0, 0x0) vmsplice(r3, &(0x7f0000000380)=[{&(0x7f0000000180)="5e0000caa218d33a449cf234ff5e1d5a6af832149ef400000000", 0x1a}, {&(0x7f0000000340)="d0517b374be2d61bf873ce6a034aea21056c37c5ca38", 0x16}], 0x2, 0x0) 06:27:46 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r1}, 0x8) sendmsg(r2, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000a00)}, {&(0x7f0000000480)="940047bd5f4da7365ebfc3f103636baeb6a97457ad60a8dfef", 0x19}, {&(0x7f00000004c0)}, {0x0}, {&(0x7f0000001b00)="6e716d454b1022eedbce13d3d4e551f20b2f87dc532d0f27b85cbc3330e3020ce631784a0cc60abf76563adeda06aee38e8a5395576771fb55e66c8575d79a96d0fed36e7ac47648ac9072f32c1ce833d4a39ae41dbfb0435c4eed8e713911bd3593f372a900efe7022b4d7936fe1c69c1151fe758e1470b960a970b3e30698878316b5922b31f3fc08c884ed52fda686221cf505e11046f94876206ad40b9a8cb5016ceb1b718", 0xa7}, {&(0x7f0000000240)="7eed52caf49cb3bf2bed5ad47cf0399d28aa064ef8c77abe337d75ba7e15299001dff2c2a1434609aece1bba4bf5189468afd23c36910804d5f6b67cb110db3930c53510b7492c6bd97a03a3e7b208819902d83deae08c3db74dd2cfaf1342bf54d56fb5ab732eadca0608191e83a036aa792fc2b108591fd441d67828b33d8b10f03b33c76f5759d10db11f60285bcdd553037024ad03920def873d07327be4b07f6a3df918ca", 0xa7}, {&(0x7f0000001d00)="29deb346f62d3d9bdde89c823d97e5beb919b963c412b6e242e3aa45400b26439967fc256d6af5002329996621e9ca698691a24871b4c221c26a3540ea41a1b5507a820d84f69fb575437c7148f0167c18824ee261cb05b7fb918196bb9060477c89117dd6973dbfa940", 0x6a}], 0x7}, 0x4000080) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000740)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000700)={&(0x7f00000007c0)={0x21c, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xb82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80a3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}, @TIPC_NLA_NODE={0x2c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x1c, 0x3, "45a07dd10550ba9f6feccb67854304719c0f46bb5bfa08ac"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x160, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "70fa6a75be1d0ab784ec03d2a2205f4044d73e07e43793504700"/36}}, @TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "c0b9aeb2dda2281f05e1655274deb764c493fa4d6cc8296931f23824d62fc7ed253b"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xb5, 0x3, "19423272c8754e68479bc8fbf5e3216e2475d3054396dea7befa562f648532e8eaee75cb6cd3133bb03137d4a0c54c8ccd13ee6f4b7c6452155501229031bdc27c5f4ed2fbc60f863cf11eec3628caf86ec8cba12402811d890565aa750d348b84ad609cb22093c9cbdd39fafd3a9321838a13dd4c8aeb1134c420a0d5448da94d289291bbb0fab8b5b3a9e5e0d7c9ab133fd321899ce418a1a89f44d9956d95c370e62657e43fe33c970adc0001eccefd"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffd}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800}]}]}, 0x21c}, 0x1, 0x0, 0x0, 0x10000800}, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x101100, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, 0xffffffffffffffff) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sysfs$2(0x2, 0x7, &(0x7f0000000140)=""/214) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000780)=0xdad4) ptrace$cont(0x7, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x79, 0x79, 0x3, [@volatile={0x4, 0x0, 0x0, 0x9, 0x5}, @struct={0xc, 0x2, 0x0, 0x4, 0x1, 0x4126, [{0x5, 0x3}, {0x6, 0x4, 0xfffffffd}]}, @ptr={0x3, 0x0, 0x0, 0x2, 0x4}, @func={0x3, 0x0, 0x0, 0xc, 0x4}, @datasec={0x6, 0x3, 0x0, 0xf, 0x1, [{0x3, 0x6, 0x80}, {0x4, 0xc8e, 0x5}, {0x4, 0x5, 0x1}], "a1"}]}, {0x0, [0x60]}}, &(0x7f0000000300)=""/4, 0x97, 0x4}, 0x20) 06:27:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000900030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "5449f728a8fe32f77453a5e71ce3d7389a986ad7a6c25725b126746277822e50e2c06d4ee64c1a1ea6e4251fd959a0322030180a7fff2209720c29334bee150a12a368c2071c51b3a05295ae7f9293fb982fd95839d2ceda225f75ea40e144cf03738c1fde434b8c8c6909559ce381014b3b93102e7124418bf265cd9f983714d6ac28024bbb844628eb27710c4aef17fd01e8e0e8cf34dd77689b19164c832fa1b1b6612612a29c50ac7dd2"}, 0xb0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 1344.813087] ptrace attach of "/root/syz-executor.3"[14118] was attempted by "/root/syz-executor.3"[14120] [ 1344.823665] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1344.830931] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1344.835122] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1344.845121] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1344.851552] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1344.878107] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1345.021340] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1345.039977] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1345.067631] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1345.082709] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4200, r0, 0xffffffffffffffff, 0x46) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x7) getpeername$ax25(r1, &(0x7f0000000140)={{}, [@bcast, @remote, @netrom, @remote, @default, @bcast, @bcast, @default]}, &(0x7f0000000040)=0x48) 06:27:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000c00030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1345.118566] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1345.127259] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="03", 0x1, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r1, r3}, &(0x7f0000001600)=""/247, 0xf7, &(0x7f0000000240)={&(0x7f0000000080)={'crc32-generic\x00'}}) keyctl$describe(0x6, r2, &(0x7f0000000580)=""/193, 0xc1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x10000, 0x202) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000000540)={0x1b5, 0x1b, &(0x7f0000000140)}) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25c40, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:47 executing program 3: clone(0x80300800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f0000000000)="0a5e23cf3464452b185082c127135358f88584411b133c08908d6403ad18", 0x1e}, {&(0x7f0000000100)="3d473e8078421f5a65c0c9e78f5f", 0xe}, {&(0x7f0000000200)="12b7d90a2f86ccf451aafaffa0ab2cc5c0820dcd6b790129398635900000", 0x1e}, {&(0x7f0000001300)="b6177328aecbf667771224d09932b573474a6224cb8f659736dbadaf6f8604b79ff193d2fc46df98abdd8d4a58999e0e382fb12f6a3bd2dde6a6e038cf5ae788fa9fc840a8c7c42cf887e3cdecb9df6f4ce6cb47835d45ff8789f2272e5de214d60ac589d447d7d8dcb00dbd5a3a2bc5f76fb629a58c531633f5a031c0899506824b3fb7911c6fd35ad3c8666843de54c57c6c3c479dfc6948d8a56b3ab7dfbfb803846aa6594409ad5521099091ad61a57ae45f2c78e920036bde5e03da92fb17e4d706853d6a5cd4c7b66d416ae9c2e73417a28804daf0a6de6a98aafb1bc08d0f5120b5f05404cc19c44f2e9f2248d65175f9749622fa9c41c2063142ec6de53fdccd90ff90e401c9417a42b3439bbf40545569b93629bb4ba0dd62405ad5d0fcb99ace3bda6b9ddcca323f0064b216bd01e4f9cf55daed4684183169de17346550807b8e4d413148254277d20e6ab682c60adac955dd5e4bc613bee5807c9954cbaab57e409dd25ebdf7ab64ae1dc081e670377dd33658a931f1803b8cb06c9e41600705b7fe87b2184ceb601a7321af79e141c1eb64ccb31c6d69c0676a160e0821fe637317dc29c799b1522c1d19ba96ffcf16ecbf732dcc9c66248eeefd88d898cf86797cfdecb1345a2a2dccadbacc6ff09afb3fba74767a64f0cb6bd037c0860ad38e787b4224819208e55a73900c6c20e6981279ae598d6f5bc07e0d289e01cf553ca06d5f722561f6fc161b709652a3d72dcf3460e63f012c2011a28769af856339e4aeda56ff003174bf1bfc150a1d8f62edbff6d54fb7801c78ef1e4d8e48fd7c6d940a54c25f70ea565a54bfb6404475dda086ccaa74376ec48129ab75d5d031ccf0821c60467459c8c6fc78963a1a1677787f0d2c7eb01c4d0e5354e2b717157e14e6f4898a1e4ac4df1eceac9bdae39da467ebe8a6d2e81513e9ef22a906eee3ebb0810827482fb450e1558c7e4363fba0ce51f6f794660328df446b46a7eec97080eb26d792e9855db3b27e25239cac729d1d71bef030b018ec715d8b5f6e561283dbdfbe424591e83d740724073cd65020ad5f3871c79d5ef8fab2c564f046689ab7e91f1dbd65f9f287ca79b9763f0c4cbe7500f3f113faf2761b8f0d330196ebce28aaeaef0846ba2af2b36053e0c2197200fa1cf202ce6c1ccafa71942f06844504efd9c9f2c96417c2256bf819ae561186044cddcf9636214fb5d02976a6e2000e5db8d32d04d57f152f0cf9ec1890607ea0a14a29c4809746d11586b45342b24c2de262320b0f384eb10cf202c598fe26f369367f2a2f9e493ae91b15e6c9aa63bbb53c9f98d9f4caecfee34d2fb2c43feea7c4c9081b8c0a0bbee035595dc6fd5aa5b127840e507ce81add4772a2726b62634256249f14ba84dc21245f8bea09d2d963525f91ceb31f76c43b092ff1449f26ac5b9ff15e726b971f190018ba5fb1658fe158f5f8cac9b223647334371e0ead0bbaeed18a5751f336732cbd8018a02dbf9ecec76266b68b4dee760d6532187556c03f064035c642d9cf22e79a0408e0776692dad93cb193840ddd6011b55fb058d61b6765e718610c6578217b737c0162f93f2c89c427e2a05ed78d21023b7ec975b56e85057869f1a8c76e8f61b014606526d98ab4d6340346aa29926acd495b5151599e804c2e79860d1a5a5e96ddbf90d3e9e5de8dafc6bc9cb2731e9a2a7abec9434ec99a1dcbd4d04b120bb4476f8bc581b1c625213659b4668a44ad76f3bf7ad9f10894fd99f12e672cfd8aad282274f24bb094677ac58c4b7491dbbbef763b4fb477b90d5aafec8b38188dcfdafd3df57dddb5ce93bfe7510fb1f31768b8c09c603e71b87b94e45f5b0fb0f833696ea14fb07beea0a8114a2e3e08d0ded88b3f24edc625e15f7151ec24755e073efdb30e643c021829f0d046d376cf7dd55e8c8d9ea0a1d9eca8954930d21d1651c8a232dfa18ea118b137967c666e155decb64818d15ae33649a6b5cced2b860f2fdf613865cc49b3c1396e8a7da3162ed243a385256a6309caef2d8244963b24b6691bc3ec444728dc1fa15eaa74ac56c7f4399aafb7266d9e9cc1d1d66d587e9449587dd6940ae36530c9b2acfe71330b5dc783dbacd68a9c67b2b72710a9feceb327a31586005f8a2c8d1f66c02c5252133b8599af7d608f36ae2f47185a87503019a0769d5b8a62b0ca26bf5299e318caff889b9603ec1dad4e6957a43eedc7111948594fffee3657cbbd72f24e5708825bd48d9d12ff33fc5301186c223d6959f344648a60eb8f62968c4a22baa62f5c257afc5b1c1842ab30f83806b1d5ca56575651c4054d21e0b358deded8052353fa83d2d702ced5324f36a9260ce3244e1cfea41e495944afd9ce4243ebc6166f14277a3e9b6c9a5c3e776af409a809ab7f5418aa78406adca58d329c6d578b1b513325f8aac04958921e5f0d6eec8350b8617d4f15fdfabf9ffd50a0e30ded194ed0e6c73cd152f4917ac70c64980c96119eb7dff280b32fd280008262fa576c3373d18f0c0e79e48b24fc2650ff3c38f2c934606b19130355495ac1d724ca9ffab3be42712bd574bb7f6e2edd5f64ca9025aad2efb852a8f2fce04b63b9c6b819ad46f2412d556254556a9b15c3495332ef3b08639f4ba88d2fbc07e35e8c1dd0ac51be3a4c76c77b235b251ff89cac39da498f1b036a515c240fa0be72722b95c80ecc58eaac7cef6450114746a673037671727f13180471580787fe9722493be323867ebaab31d44e2c4982e97925d4512a93688c3de12fb547e7ca6835964a20f6f29620d6b30c77aa48ee35fabefaf2c2c7115cf7e0d4f98c746a5aa2cb698abc60865fa4af8c8c28d7af13ec4e52b49c307bfe0bc07f0e1dde3b36dbb01b37081ae9bd70e1b116173ca61864733020b819b7e92d1a433598a97c18f376d2a1815bcd09b6d5d52bb7b2406b6d231cd048c825d65b9f27687ee061e9bc2c4d6cd1805c8b2005601a0c8949326cee5c2e334651cb5ae281ba1696ed67d685d9cc9fb968f2d6fad7d547178e338ea6be4749ad499cfd41ee3a76f40838c29b35d5714c7b39b1b9bbb4c94e8e86838b73ef170eba8f41773962569e694fc9014790138472b30f6b0689c52ac568f0158da06d84710d1d41bd1e71e7f0b1459e9fd0ad46acab376dd967bbf8bd94bf8ced9be5fc3fb7018a0bea56824d1188f442cdc9c495e78f47177e2098578fa8bfca0da905bacb0f7d7dced0149dc6830176cdf3389c155a4a38e903268744e25a0534e1815b5399156fe3b284943234b5a7561862d90142c039a3430795ff68acd750f19658c7c955d225cc9bbf2d85bbf40397859a78cbec19ee75e2786e7fcdca044bc40110bbf285619c6e84a19fa0612dbd4055cbafe5067ee06796299fc84f0e2d0bd27cf52b4332961f3b59d388597c89bbd81e10b9c05c6853536d0252c1dfa76005cee2a4b59bff2c08543e9c38bae2593c0ff195cda4fd6c62b3a3fcf183987624bd5c9d9ac290a8885286c1c2df5ea7d1e8d59865184390df8c5e7e79e860c84a16fd9391e9087a6a2fc05555fc673de7eb33f1ee5cfc9dc9f3848c6bb44049d8adec009f1f061f307ad8e4a2ee9428c065fce3ccaa1852fe17eb5752a0605cc4d9f789ff7fd1cd8fbcdb2c7bfc2678a13207a68d1a2ca0b98ef12ea7691d29bfd1e117b9c518ad6137cbd13693b078f6fd7755e2fbfd7baeac7cd77091341283a6384afb36ccb019541e9b04d31f348271f16c099d9e4387e815d0c01a47742a82e6f31b9f275c7f8a9f726ad069fb148951ca57fbe4d68aa87cf058a245af9233be37213f3dca3c0f994fbf936003ec26d342bec125495f75429acb6c00332496f27350e33aead338387dc8903c0169fbb83372e2d91edc17f845090c8ca844ce29c3d3dc0d4cc9a1289354ea35dc02fccfb8485a379600edbb33446d0b22cd28636d5345fa65ed93f5cb1c7f38b3fde719f28a6549cb87219066840f720535dea7b9023e91080343b58a28ffe70c07fb47d0f1bb778f624e49c8c760f86630a3bc1290e39d79b2428333fc712db2104e18f896d95d703d0af696dfe0996b43057af524b2109b4231adf2a463c9d028ddf07034fe5d54f4fbae24cfe6547a871b87614fbb213276bb9ebc26d97d21756d421f965ea6bc5ce73676c25c66c2c3dede24f02397a4030f6471f3f027df275e20d8269621b638bcdd64540b586113a71959a35b30aaebff15a4c888ac56ffd47cf8f1304ad1147301878cf69b0f7e5e26fb6609011478af9f52c192c764c65488ea203b2f61b9cbf4ea73fb4b3aaae4a08454478740eb3f8af3ee26c64731bebe301151b15c19918fe64fb5f65d715985b4b41a0dd21e0ee25245e3b744ed0b760dd245cf719562c22f7389c83123048fd9b9fa36e2be22a39ec52e9edf516494ab6f8d81666d36ceeee73dba0560fc4eb8179cf88dea15ef9984730859d140e9479f3c040eb22d89ff9305bf8eaa2067f0f006cbec10cf272a20f65ef6ac8fc1157b7c5cdac068ea452543023cf25784fce4ae0c07f428b96d0a73d45dbf3a34c01fed9f455080e7d4022803aa8560a91b0ef3473b0a5757e2387340dad3051322f6419fb79200cfd6be0ffdd6d8e5c79797198dc95bb4e56c57f5f1b098d0287ef74adf8cbdf59ff8f406415a98858ca9295d066c71531bb47dd4fe37617e265f467991e7b52eda555fef5aeade23320f134c3c8595510e58768bb75f58298df8968e39eae91653eb5ed18bfb1217ce4ae9e0929812bef61619a865ca2ef3bdd834f19137d07955e80cd0506b08b5d1e8f069f36efa6202eb6d20f0b7ed79efd91d616880af7a7b73a8f7793e3778faeb853145085168b8b2ff7a12c78af2f059ac68952d3a5a98ef8a185c8f9969a152f818f50e1c439be6b653f5138a0b501bd5421f4912ebbe994da4de18633a2f58722f89e277fe728b38ccf92c8876d1dd196c473c37b97c27c88ceec8f55b6663de1873157231bdf5af3b3073441b055ef53dd5eab1912ba8c9beb8b48e76f418a28eeee39b216693e91be669b8b85db3404b143f294eb86fc0d53612df7ad8c9ba76247ce6cad2a2de0c4559bf5a1c233f5e1d50f897d99a4e129b35bd7f25f30298a3b29a8968147e263652509a01ef8619424b6307a8691265e310aecf78111fbc327c765a6d440fd218822ac7e6e339a1c60cff894851a0637e6111732da3f32b33878f91cdc157603b6749ae86cd3154a2da6a14982b3bc7ac36cc1acbaa53e24a534fdef95e1d29f8aef32e1411df7a7f6245eb31832371595610d9c368b8ced0095f0184430d56fdaf584c82cf94773e3c0f01fd0591f85aa44cf066c1e3e458580b5fe39c1d27839b57b770e1df3bf2337e5c76e339b17823cac817e90d0245ca126bff351b9d1c78eec237140642d43f6382f669bbedc66bc961d36ca688861e968031f0e300af0917f39ccf0a5a2eb77db6a091b1dbe31d3f86f1b33ccd287904de03319040c23305e6fe1c3de12460a73a815d1bc080ced8dd442a4d8c86b39f7ebb253d119c448ed52ebe8bb1a3e7aa50b0cd336abdf6a65cd6fa3076275b5e0ee2bfdd58c2d78a9e6cc4322d161c9de27d2b93e35b4e7e18f870adc3ecb599602bb1d3a192da298af2009ce41a1acda5c7052e6e940163c516057ad2e879c548d69fa4132847cfffb2e1c9214f7f84db752c3a8694352853380801da7f8fa5c7b3fd80a4bfe5963d491229791293b2a44e6eb579b61d05f90969fad5490f7619", 0x1000}, {&(0x7f0000001240)="2fc5032e1be4ed2b2c4b57b5d0044dd9fab67fb31e1baa4490244c3dd50e2e35b4194ee29a3fedd8eec4bed712a8f97dd2c9a5657e577b", 0x37}], 0x5, 0x0) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000040)={0x2e, 0x2, 0x2, 0x0, 0x0, [@dev={0xfe, 0x80, [], 0x12}]}, 0x18) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/46, 0x2e}, {&(0x7f0000000140)=""/94, 0x5e}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030040002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1000, 0x208440) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.current\x00', 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000180)=0x5) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1345.401576] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1345.408693] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1345.546678] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1345.550287] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1345.562737] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1345.579976] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1345.583507] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1345.593450] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:47 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0)={0xfff}, 0x0, &(0x7f0000000140)={0x976f, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r3}, 0x8) sendmsg(r4, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000a00)}, {&(0x7f0000000480)="940047bd5f4da7365ebfc3f103636baeb6a97457ad60a8dfef", 0x19}, {&(0x7f00000004c0)}, {0x0}, {&(0x7f0000001b00)="6e716d454b1022eedbce13d3d4e551f20b2f87dc532d0f27b85cbc3330e3020ce631784a0cc60abf76563adeda06aee38e8a5395576771fb55e66c8575d79a96d0fed36e7ac47648ac9072f32c1ce833d4a39ae41dbfb0435c4eed8e713911bd3593f372a900efe7022b4d7936fe1c69c1151fe758e1470b960a970b3e30698878316b5922b31f3fc08c884ed52fda686221cf505e11046f94876206ad40b9a8cb5016ceb1b718", 0xa7}, {&(0x7f0000000240)="7eed52caf49cb3bf2bed5ad47cf0399d28aa064ef8c77abe337d75ba7e15299001dff2c2a1434609aece1bba4bf5189468afd23c36910804d5f6b67cb110db3930c53510b7492c6bd97a03a3e7b208819902d83deae08c3db74dd2cfaf1342bf54d56fb5ab732eadca0608191e83a036aa792fc2b108591fd441d67828b33d8b10f03b33c76f5759d10db11f60285bcdd553037024ad03920def873d07327be4b07f6a3df918ca", 0xa7}, {&(0x7f0000001d00)="29deb346f62d3d9bdde89c823d97e5beb919b963c412b6e242e3aa45400b26439967fc256d6af5002329996621e9ca698691a24871b4c221c26a3540ea41a1b5507a820d84f69fb575437c7148f0167c18824ee261cb05b7fb918196bb9060477c89117dd6973dbfa940", 0x6a}], 0x7}, 0x4000080) connect$pppl2tp(r4, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x4, 0x1, 0x3, {0xa, 0x4e23, 0x7fffffff, @ipv4={[], [], @loopback}, 0x7}}}, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r7}, 0x8) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f00000001c0)={0x0, 0xc, 0x4, 0x2000, 0x81, {0x77359400}, {0x5, 0x2, 0x80, 0x4, 0x65, 0x6, "8c1e4cc4"}, 0xff, 0x3, @fd=r0, 0x7, 0x0, r7}) r8 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x32) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000140)={0x1f, 0x4, 0x4, 0x100, 0x2, {0x77359400}, {0x3, 0x9, 0xd9, 0x0, 0x0, 0x6, "00ff5aa3"}, 0x1, 0x3, @offset=0x4, 0x3}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040041000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1345.765795] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1345.779709] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1345.800862] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1345.810601] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030060002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25c80, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1345.973335] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1345.980369] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:47 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000080)={0x7, 0x20}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x434}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000001c0)={{0x1, 0x2, 0x35, 0x7d3c9833b41d3151, 0x4}, 0x2, 0x3ff, 'id0\x00', 'timer1\x00', 0x0, 0x7, 0x20, 0x8, 0x3}) open(&(0x7f0000000100)='./file0\x00', 0x80000, 0x118) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = creat(&(0x7f0000000300)='./bus\x00', 0xcd) fcntl$setstatus(r4, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r6, 0x0) ftruncate(r4, 0x48280) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000002c0)=0x1000) io_submit(r5, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0xf5d6f000, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 06:27:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1346.071876] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1346.078972] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1346.101420] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1346.108542] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1346.141672] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1346.148985] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1346.156868] audit: type=1804 audit(1603002467.891:59): pid=14259 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir353838176/syzkaller.dbLYDx/1394/bus" dev="sda1" ino=16337 res=1 06:27:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040001f00030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1346.311396] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1346.320726] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1346.328142] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1346.336033] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25cc0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1346.377660] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1346.392597] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030fff002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1346.668145] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1346.675595] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040002000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1346.728376] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1346.735499] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1346.763573] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1346.775642] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1346.833985] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1346.843169] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1346.940750] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1346.947727] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1346.957899] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1346.965565] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1346.983343] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1347.016426] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000019440)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/102400, 0xffffff10}, {&(0x7f0000000180)=""/61, 0x4c}, {&(0x7f0000000200)=""/53, 0x35}, {&(0x7f00000194c0)=""/171, 0xab}, {&(0x7f0000019380)=""/172, 0xac}], 0x7, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = fcntl$getown(r1, 0x9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={r2, r4, 0xffffffffffffffff}, 0xc) ptrace$cont(0x7, r0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040)=0x7ff, 0x4) 06:27:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'caif0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="5800000024000705000000000000000000000008", @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100736662"], 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000d80)=ANY=[@ANYBLOB='$\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB="0000000600f9c100"], 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)={0x294, 0x0, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x800}, 0x40000d0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030002002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040002100030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25d00, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1348.725248] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1348.734821] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1348.735196] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1348.748754] ptrace attach of "/root/syz-executor.3"[14339] was attempted by "/root/syz-executor.3"[14346] [ 1348.754828] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1348.760292] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r1}, 0x8) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1348.779259] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1348.812959] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1348.821887] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 06:27:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(r0, &(0x7f0000000040), 0x4, &(0x7f0000000140)) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000240)={0xa, {0x39a, 0x2, 0xf, 0x4f1}, {0x6, 0x80, 0x3, 0x101}, {0x3}}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25d40, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1349.009774] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1349.019683] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1349.029154] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1349.037923] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030003002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040002200030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1349.185645] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1349.194138] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1349.290637] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1349.302317] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1349.310500] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1349.317878] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:51 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1349.334822] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1349.342120] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1349.447851] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1349.454963] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1349.519651] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1349.543233] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 06:27:51 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x3}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25d80, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040002300030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030004002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:51 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1349.706433] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1349.719443] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1349.729137] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1349.736894] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1349.752349] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1349.757647] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1349.913202] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1349.917559] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1349.920186] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1349.927454] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1349.948212] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030005002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1349.985203] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040002c00030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1350.172366] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1350.174593] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1350.181257] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1350.187644] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1350.292331] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1350.299648] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1350.301718] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1350.314456] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000140)=0xc) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25dc0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040002d00030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030006002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:53 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r2}, 0x8) sendmsg(r3, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000a00)}, {&(0x7f0000000480)="940047bd5f4da7365ebfc3f103636baeb6a97457ad60a8dfef", 0x19}, {&(0x7f00000004c0)}, {0x0}, {&(0x7f0000001b00)="6e716d454b1022eedbce13d3d4e551f20b2f87dc532d0f27b85cbc3330e3020ce631784a0cc60abf76563adeda06aee38e8a5395576771fb55e66c8575d79a96d0fed36e7ac47648ac9072f32c1ce833d4a39ae41dbfb0435c4eed8e713911bd3593f372a900efe7022b4d7936fe1c69c1151fe758e1470b960a970b3e30698878316b5922b31f3fc08c884ed52fda686221cf505e11046f94876206ad40b9a8cb5016ceb1b718", 0xa7}, {&(0x7f0000000240)="7eed52caf49cb3bf2bed5ad47cf0399d28aa064ef8c77abe337d75ba7e15299001dff2c2a1434609aece1bba4bf5189468afd23c36910804d5f6b67cb110db3930c53510b7492c6bd97a03a3e7b208819902d83deae08c3db74dd2cfaf1342bf54d56fb5ab732eadca0608191e83a036aa792fc2b108591fd441d67828b33d8b10f03b33c76f5759d10db11f60285bcdd553037024ad03920def873d07327be4b07f6a3df918ca", 0xa7}, {&(0x7f0000001d00)="29deb346f62d3d9bdde89c823d97e5beb919b963c412b6e242e3aa45400b26439967fc256d6af5002329996621e9ca698691a24871b4c221c26a3540ea41a1b5507a820d84f69fb575437c7148f0167c18824ee261cb05b7fb918196bb9060477c89117dd6973dbfa940", 0x6a}], 0x7}, 0x4000080) sendmsg$AUDIT_ADD_RULE(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x444}}, 0x4000800) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 1351.998669] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1352.000042] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1352.012834] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1352.025655] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1352.035509] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1352.043806] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030007002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040003f00030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25e00, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1352.212644] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1352.237712] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1352.362519] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1352.372130] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1352.409465] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1352.425347] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030009002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1352.510064] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1352.516977] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1352.524469] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1352.533713] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040004000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1352.629339] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1352.643932] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1352.655451] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1352.662246] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1352.800179] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1352.812670] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1352.829051] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1352.833597] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1352.954519] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1352.963710] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2440, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x541) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:27:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25e40, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:56 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000340)) ioctl$KDSETLED(r0, 0x4b32, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x3, &(0x7f00000001c0)=""/162) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r5}, 0x8) sendmsg(r6, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000a00)}, {&(0x7f0000000480)="940047bd5f4da7365ebfc3f103636baeb6a97457ad60a8dfef", 0x19}, {&(0x7f00000004c0)}, {0x0}, {&(0x7f0000001b00)="6e716d454b1022eedbce13d3d4e551f20b2f87dc532d0f27b85cbc3330e3020ce631784a0cc60abf76563adeda06aee38e8a5395576771fb55e66c8575d79a96d0fed36e7ac47648ac9072f32c1ce833d4a39ae41dbfb0435c4eed8e713911bd3593f372a900efe7022b4d7936fe1c69c1151fe758e1470b960a970b3e30698878316b5922b31f3fc08c884ed52fda686221cf505e11046f94876206ad40b9a8cb5016ceb1b718", 0xa7}, {&(0x7f0000000240)="7eed52caf49cb3bf2bed5ad47cf0399d28aa064ef8c77abe337d75ba7e15299001dff2c2a1434609aece1bba4bf5189468afd23c36910804d5f6b67cb110db3930c53510b7492c6bd97a03a3e7b208819902d83deae08c3db74dd2cfaf1342bf54d56fb5ab732eadca0608191e83a036aa792fc2b108591fd441d67828b33d8b10f03b33c76f5759d10db11f60285bcdd553037024ad03920def873d07327be4b07f6a3df918ca", 0xa7}, {&(0x7f0000001d00)="29deb346f62d3d9bdde89c823d97e5beb919b963c412b6e242e3aa45400b26439967fc256d6af5002329996621e9ca698691a24871b4c221c26a3540ea41a1b5507a820d84f69fb575437c7148f0167c18824ee261cb05b7fb918196bb9060477c89117dd6973dbfa940", 0x6a}], 0x7}, 0x4000080) ioctl$TCSETXF(r6, 0x5434, &(0x7f0000000100)={0x1f, 0x7, [0x34e9, 0x6, 0x1ff, 0x3010, 0x4], 0x68c}) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000300)=0x10000) symlinkat(&(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030021002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040006000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1355.043694] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1355.057742] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1355.133664] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1355.141059] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1355.148486] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1355.161308] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1355.166606] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1355.184696] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030022002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:57 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1355.373473] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1355.379415] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1355.380617] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400fff00030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1355.415453] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:27:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25e80, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1355.531163] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1355.543362] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1355.660817] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1355.683800] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1355.697848] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1355.705317] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:57 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000040000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1355.779384] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1355.808027] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1355.962173] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1355.988394] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1356.003560] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1356.010897] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1356.085818] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1356.094464] EXT4-fs (loop4): Can't read superblock on 2nd try 06:27:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) vmsplice(r1, &(0x7f0000000100)=[{&(0x7f0000000280)="0f34", 0x2}], 0x1, 0x3) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.current\x00', 0x0, 0x0) openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.limit_in_bytes\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) read$char_usb(r3, &(0x7f0000000140)=""/204, 0xcc) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x80000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 06:27:59 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x12000005f) ioctl$VIDIOC_G_STD(r5, 0x80085617, &(0x7f0000000040)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:27:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030023002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:27:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25ec0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:27:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000070000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1358.066722] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1358.082994] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1358.103272] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1358.125133] EXT4-fs (loop5): Can't read superblock on 2nd try 06:27:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)=0x3) delete_module(&(0x7f0000000180)='\x00', 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000a80)={0x0, 0xfffffffffffffffe, 0x42, 0xff, @scatter={0x5, 0x0, &(0x7f0000000680)=[{&(0x7f0000000400)=""/165, 0xa5}, {&(0x7f00000004c0)=""/204, 0xcc}, {&(0x7f00000005c0)=""/182, 0xb6}, {&(0x7f0000000740)=""/166, 0xa6}, {&(0x7f0000000800)=""/210, 0xd2}]}, &(0x7f0000000900)="f243bba7eba6c266ef2cc251a3b162e6ade51ec9c1287f66195308d514136e9a8be4b72c8b1934838c6921ba5e73e5668ff406d18d6fda1422f7bc0d47ffebe434ba", &(0x7f0000000980)=""/185, 0x80000000, 0x10, 0x1, &(0x7f0000000a40)}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b00)=ANY=[@ANYBLOB="280000003366d895aab85d0ddfbf4eb1136a9fb715a76fed8cb218cd44a65a23210095e0867400dba393710398665279556f17ab716a449df9a34e2cbc392336c4855ec34bb445aa0bbaba290ffd705bbbbb716ddd974806000000f0efa5ba556c475f13b202e82e2408737fcc58628f5696a0b8efd674497556a39429a1", @ANYRES16=r2, @ANYBLOB="050000000000000000004400000008000300", @ANYRES32=r3, @ANYBLOB="0c00238006000400feff0000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="08002bbd7000fddbdf252e00000008000300", @ANYRES32=r3, @ANYBLOB="0800c9006c0900000800c900641400000400cc00050018012a0000000800220162010000050018012100000008002700010000000800220127000000080022015c0300001000b000200000000010810007000000040046003000e380060003000405000008000200030000000600030013020000060003000309000008000200020000000400010058005180480000800800088004000200090001002b136079bc0000000500020000000000080007000000000004000600140008800400010004000200040002000400020005000900020000000c000080070004000700640010009d00001000000600200009008100"], 0x10c}, 0x1, 0x0, 0x0, 0x4091}, 0x4044) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan0\x00'}) [ 1358.213991] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1358.221641] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1358.247701] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1358.249701] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1358.264383] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1358.265204] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:28:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003002c002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1358.361197] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1358.383482] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25f00, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000100000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1358.735186] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1358.744704] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1358.816472] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1358.824248] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1358.831516] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1358.838577] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1358.859330] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1358.866708] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:28:00 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={0x0, @rc={0x1f, @any, 0x5}, @nfc, @can, 0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='wg1\x00', 0x1, 0xd5, 0x400}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003002d002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000140000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030060002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1359.116040] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1359.124549] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1359.133584] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1359.147087] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25f40, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000210000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1359.380875] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1359.391159] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1359.468094] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1359.475421] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1359.479068] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1359.489200] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1359.495474] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1359.508508] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1359.587195] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1359.594598] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1359.650513] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1359.657471] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000032d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25f80, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000002230000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.current\x00', 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:28:02 executing program 0: write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x73, 0x2, {{0xc8, 0x2, 0x3}, 0x2}}, 0x18) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000100)=0xee) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000540)={0x1, [[0x7, 0x16845946, 0x1, 0x20, 0x7, 0x8fd, 0x7f, 0xc60], [0x200, 0x0, 0x2, 0x4, 0x400, 0x9, 0x0, 0x4], [0x3, 0x1, 0x3, 0xd8, 0x8, 0xa3a, 0x5, 0x1]], [], [{0xffff, 0xfff, 0x1, 0x1, 0x1, 0x1}, {0x2, 0x427, 0x0, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1, 0x1, 0x0, 0x1}, {0x10001, 0xffffffff, 0x1, 0x0, 0x0, 0x1}, {0x1, 0x7, 0x1, 0x1}, {0x9, 0x0, 0x1, 0x1}, {0x800, 0xffffffff, 0x1}, {0xffff, 0xff, 0x1, 0x0, 0x1}, {0x6, 0x1, 0x1, 0x0, 0x1, 0x1}, {0x4, 0x1a, 0x1, 0x1, 0x0, 0x1}, {0x3f, 0x8001, 0x1, 0x0, 0x1, 0x1}, {0x1ff, 0x7fffffff, 0x1}], [], 0xfffffffa}) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$BTRFS_IOC_BALANCE(r4, 0x5000940c, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, &(0x7f0000000140)={0x1ff, 0xfffffffffffffff7, 0xfffffffffffffffd, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 1361.297538] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1361.306926] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1361.315515] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1361.323353] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1361.442338] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1361.452673] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1361.485628] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1361.494096] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1361.518111] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25fc0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000002d0000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1361.537908] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1361.575759] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1361.594124] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030010042d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1361.753663] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1361.763588] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) [ 1361.773504] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1361.801785] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000052d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000410000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1361.843209] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1361.852657] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (37 blocks) 06:28:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1361.936979] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1361.948321] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1361.970289] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1361.991213] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000004b0000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1362.044058] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1362.051198] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000062d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1362.210019] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1362.222976] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1362.240171] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1362.264670] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1362.419624] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1362.426551] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1362.434316] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1362.443929] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1362.479864] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1362.494450] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1362.594178] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1362.602180] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="cb33", 0x2}], 0x1, 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:28:06 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vim2m\x00', 0x2, 0x0) accept4(r3, 0x0, &(0x7f0000000240), 0x80000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x20002, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) fstat(0xffffffffffffffff, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000040)={{0x0, 0x6}, {0x7f, 0x7}, 0x8, 0x2, 0x1f}) r6 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SOUND_MIXER_INFO(r1, 0x805c4d65, &(0x7f00000001c0)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000003d00000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26040, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000072d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1364.356348] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1364.361142] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1364.377602] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1364.388147] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1364.434879] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1364.443993] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000007fff0000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26068, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1364.537248] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1364.559035] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000092d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1364.682775] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1364.690517] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1364.703979] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1364.711833] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000200030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1364.834333] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1364.841811] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1364.842109] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26069, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1364.879965] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1365.052778] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1365.061643] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1365.075221] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1365.082563] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1365.158982] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1365.160341] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1365.165895] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1365.225653] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1365.355390] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1365.362549] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:09 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0xffffffffffffff88}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x168}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019600)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 06:28:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030004102d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:09 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="8c010000120000042dbd70007fdbdf252303fc064e20fff7010400003f000000d0e000000600000001000100ff7f00008b00000007000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x18c}, 0x1, 0x0, 0x0, 0x4004084}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$BTRFS_IOC_QUOTA_RESCAN(r2, 0x4040942c, &(0x7f0000000240)={0x0, 0x8, [0x8, 0x2, 0x2, 0x5, 0x80000001, 0x7ff]}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000100)=0xee) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x3, 0x6d}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000300030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2606a, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1367.418038] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1367.434282] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1367.442357] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26080, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:09 executing program 3: ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340), 0x0) ftruncate(r1, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x300, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x7, 0x76}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x4040000) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8}, @void, @void}}, [@NL80211_ATTR_VENDOR_DATA={0x39, 0xc5, "00b049f96d6de5c8d029e2429218d7adfab9643ceb0a430af2ac29ca7c30bb119f06d21f0795ee1e1f8c51ec16729d0cf873a86580"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x2}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x80000000}]}, 0x68}, 0x1, 0x0, 0x0, 0xd0}, 0x44000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) [ 1367.466369] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1367.471800] ptrace attach of "/root/syz-executor.3"[15122] was attempted by "/root/syz-executor.3"[15123] [ 1367.487922] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1367.500696] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1367.693869] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1367.714141] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1367.724402] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1367.733403] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xc000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1367.744682] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1367.747604] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000202d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000400030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1368.064035] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1368.083562] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1368.108962] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1368.140059] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x260c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:10 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@private1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x4, 0x0, 0xa8}}, 0xe8) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e22, 0x1, @remote, 0x9}, {0xa, 0x4e21, 0x1000, @local, 0x68a}, 0xe840, [0x8, 0x4, 0x7, 0x0, 0x40, 0x400, 0x29e, 0x80000000]}, 0x5c) 06:28:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x6b6b6b00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1368.328022] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1368.339372] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1368.346541] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1368.348993] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000212d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @l2tp={0x2, 0x0, @local}, @ethernet={0x0, @remote}, @ax25={0x3, @default}, 0xfffc, 0x0, 0x0, 0x0, 0x6}) [ 1368.634025] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1368.654471] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1368.666906] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1368.669760] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000500030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000002000)='./file0/file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0/file0\x00', 0x280440, 0x0) syz_fuse_handle_req(r0, &(0x7f00000042c0)="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", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x1b, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}}, 0x0, 0x0, 0x0, 0x0}) [ 1368.860754] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1368.887526] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1368.903459] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1368.921605] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26100, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:10 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) clone(0x4000018006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='projid_map\x00') pipe(&(0x7f0000000100)={0xffffffffffffffff}) vmsplice(r4, &(0x7f00000015c0)=[{&(0x7f0000000200)="17", 0x1}], 0x1, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') sendfile(r1, r5, 0x0, 0x23) splice(r0, 0x0, r2, 0x0, 0x1f, 0x0) write$char_raw(r3, 0x0, 0x0) [ 1369.042366] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1369.046898] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1369.060186] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1369.060860] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000222d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:10 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x8000}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000040)) r2 = open(&(0x7f0000000080)='./file0\x00', 0x100, 0x180) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x3, 0x92d, "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", 0x7f, 0x6, 0x7f, 0x1, 0x7f, 0x98, 0x1f}}}, 0x120) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 1369.191124] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1369.211140] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1369.223129] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1369.230909] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000600030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1369.324363] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1369.338056] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1369.353307] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1369.362451] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26140, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1369.504336] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1369.509199] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1369.518175] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1369.544857] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000232d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1369.587115] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1369.606494] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1369.679136] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1369.686580] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1369.692327] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1369.702537] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1369.714172] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1369.714578] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000700030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26180, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1370.003671] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1370.012634] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1370.035294] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 06:28:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1370.058674] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sysinfo(&(0x7f00000008c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x0, 0x0, 0x800000080000001, 0xfffffffffffffffb}]}) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') syz_genetlink_get_family_id$netlbl_cipso(0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4800}, 0x40) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) 06:28:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300002c2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:11 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r5}, 0x8) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000040)={0xe5b, 0x4, 0x3, 0x65f1, 0x2, 0x6, 0x3ff}) 06:28:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000800030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1370.216641] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1370.238298] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1370.303458] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1370.343832] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1370.350734] device lo entered promiscuous mode 06:28:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x261c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1370.425171] Y­4`Ò˜: renamed from lo 06:28:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sysinfo(&(0x7f00000008c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x0, 0x0, 0x800000080000001, 0xfffffffffffffffb}]}) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') syz_genetlink_get_family_id$netlbl_cipso(0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4800}, 0x40) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) [ 1370.496543] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1370.506241] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1370.525036] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1370.532247] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300002d2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1370.644622] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1370.668025] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1370.670333] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1370.709540] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sysinfo(&(0x7f00000008c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x0, 0x0, 0x800000080000001, 0xfffffffffffffffb}]}) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') syz_genetlink_get_family_id$netlbl_cipso(0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4800}, 0x40) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) 06:28:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26200, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000900030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1370.938138] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1370.945200] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1370.965872] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1370.973545] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:12 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x90040, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00') ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000580)) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x40}, 0x0, &(0x7f0000000140)={0x1ff, 0x4, 0x2}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@private1, @in=@empty, 0x0, 0x3, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1f}, {}, 0x390c}, {{@in6=@mcast1, 0x0, 0x33}, 0x0, @in=@private=0xa010100, 0x0, 0x4, 0x0, 0xa8}}, 0xe8) fcntl$getownex(r2, 0x10, &(0x7f0000000300)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000340)=r5) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f00000001c0)={{0x1, 0x99}, 'port0\x00', 0x62, 0x100004, 0x200, 0x4, 0x7ff, 0x3, 0x10000, 0x0, 0x4, 0x47}) r6 = fcntl$dupfd(r4, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sysinfo(&(0x7f00000008c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x0, 0x0, 0x800000080000001, 0xfffffffffffffffb}]}) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') syz_genetlink_get_family_id$netlbl_cipso(0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4800}, 0x40) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) [ 1371.143514] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1371.151937] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1371.176635] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1371.184890] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1371.185192] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1371.207442] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000180)=0x8, 0x4) 06:28:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300003f2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1371.299835] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1371.309468] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:13 executing program 3: socket(0x10, 0x3, 0x3) 06:28:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26240, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000c00030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1371.589930] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1371.596804] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:13 executing program 3: r0 = epoll_create(0x8a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) [ 1371.632723] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1371.650464] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040002100030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:13 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 1371.720573] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1371.746781] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:13 executing program 3: r0 = epoll_create(0x8a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) [ 1371.826205] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1371.834061] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1371.940909] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1371.956662] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1371.964794] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1371.981640] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:13 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x101, 0x4) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000402d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:13 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x102) 06:28:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26280, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000740)={&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000000bc0)=[@pktinfo={{0x24, 0x29, 0x32, {@private2}}}], 0x28}, 0x0) [ 1372.159826] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1372.171758] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1372.183568] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1372.196563] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040002200030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mirred={0x30, 0x0, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) [ 1372.309515] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1372.319748] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:14 executing program 3: ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=ANY=[], 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') [ 1372.448965] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1372.472522] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1372.497068] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1372.513568] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1372.527797] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1372.545631] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:14 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x2002) 06:28:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000602d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1372.848531] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1372.866917] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:14 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) 06:28:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040002300030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:14 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0xb997b662acee05ff) r0 = creat(&(0x7f0000001640)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 06:28:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x1f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000fff2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x262c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1373.163960] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1373.195606] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1373.210547] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1373.217733] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1373.228755] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:15 executing program 3: clone(0x4000018006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='projid_map\x00') pipe(&(0x7f0000000100)={0xffffffffffffffff}) vmsplice(r1, &(0x7f00000015c0)=[{&(0x7f0000000200)="17", 0x1}], 0x1, 0x0) write$char_raw(r0, &(0x7f0000001600)={"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"}, 0x1000) [ 1373.265643] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1373.316589] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1373.331243] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040002c00030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000000250000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1373.535174] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1373.553001] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26300, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1373.602289] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1373.610072] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1373.740918] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1373.757236] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x2200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1373.788671] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1373.809252] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1373.816819] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1373.857084] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:15 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0)={0x2, 0xdd, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1ff, 0xcd5, 0x0, 0x0, 0x8}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000100)=0xee) ioctl$KDGKBENT(r5, 0x4b46, &(0x7f0000000100)={0x9, 0x41, 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 1373.955737] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1373.969948] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040002d00030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000022d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26340, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1374.055474] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1374.085226] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, 0x0, 0x0) 06:28:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000004f00)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=ANY=[], 0x18}}], 0x2, 0x0) [ 1374.179469] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1374.189922] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:16 executing program 3: r0 = epoll_create(0x1008a) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0xf0000008}) 06:28:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x2c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1374.301332] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1374.302815] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1374.311395] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1374.327169] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1374.335860] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000032d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:16 executing program 3: r0 = epoll_create(0x8a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000200)={0x4000000c}) [ 1374.391779] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040006000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1374.612456] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1374.618393] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1374.638759] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1374.662610] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1374.781039] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1374.789746] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1374.796807] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1374.803513] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:16 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) read$alg(r0, &(0x7f00000001c0)=""/165, 0xa5) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffd, 0x1, 0x5}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:16 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = creat(&(0x7f0000001640)='./file0\x00', 0x0) openat$cgroup_ro(r0, &(0x7f0000001ac0)='cpu.stat\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={0x0, @l2tp={0x2, 0x0, @local, 0x2}, @ethernet={0x306, @remote}, @ax25={0x3, @default, 0x4}, 0xfffc, 0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x9, 0x40}) socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$inet6_int(r0, 0x29, 0x33, 0x0, 0x0) r2 = creat(&(0x7f0000001640)='./file0\x00', 0x0) openat$cgroup_ro(r2, &(0x7f0000001ac0)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x10000427, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x6, 0x7}, 0x0, 0x0, &(0x7f00000000c0)={0x1, 0x10, 0x2001, 0xa56a}, &(0x7f0000000140)=0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0x10) socket$nl_sock_diag(0x10, 0x3, 0x4) 06:28:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26380, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000042d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1374.986985] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:16 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000000), 0x4) [ 1375.061209] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1375.096362] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1375.104352] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000003030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1375.112815] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1375.121464] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:16 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) clone(0x4000018006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='projid_map\x00') pipe(&(0x7f0000000100)={0xffffffffffffffff}) vmsplice(r3, &(0x7f00000015c0)=[{&(0x7f0000000140)=')', 0x1}], 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='io\x00') sendfile(r1, r4, 0x0, 0x23) splice(r0, 0x0, r2, 0x0, 0x1f, 0x0) [ 1375.377314] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1375.389269] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1375.404104] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1375.414617] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1375.423253] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1375.432556] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000052d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x263c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040001004030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1375.706262] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1375.733021] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1375.739935] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1375.740067] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1375.756874] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1375.757465] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:17 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$snapshot(r4, &(0x7f00000001c0)=""/255, 0xff) r5 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x447af39700000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1375.966653] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1375.974378] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1375.993237] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1376.011037] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1376.017479] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1376.024399] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000005030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000062d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26400, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:17 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) pkey_mprotect(&(0x7f000000b000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) [ 1376.202115] audit: type=1400 audit(1603002497.943:60): avc: denied { dac_override } for pid=15796 comm="syz-executor.3" capability=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 06:28:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) [ 1376.334679] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1376.346284] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c0000001e0001"], 0x760}}, 0x0) 06:28:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @private}}, 0xfce8) [ 1376.458606] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1376.463694] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1376.472977] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1376.483622] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1376.492842] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1376.502541] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:18 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x28, 0x3, 0x8, 0x401, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @tcp}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x28}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1376.592929] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1376.601255] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1376.706253] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1376.716844] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000006030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:18 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/connector\x00') ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r3, 0x5000943f, &(0x7f0000000540)={{r3}, 0x0, 0x4, @inherit={0x70, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000050000000000000067000000000000000700000000000000200000040000000002000000000000000700000000000000080000000000000007000000000000000900000000000000fffeffffffffffff010000000000000006000000000000000800000000000000ffdd835adce5c80fbd0827bc2c1e22018ee7c92ff0c115e1e8a0e2dba5635fa9b545cb3ad251d277c90baebd0a7a41caacbccf8634cb50f55566dfb182782b03ce6941cf41fcef5a3b24c26a628711faeb7621f48ea69871"]}, @name="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"}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = fcntl$dupfd(r5, 0x406, r3) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000072d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26440, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1376.862737] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1376.862960] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1376.888199] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1376.903634] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1376.993865] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1377.001466] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1377.011737] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1377.020798] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1377.036783] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1377.049083] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000092d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000007030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1377.234065] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1377.246253] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26480, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1377.281608] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1377.297645] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1377.363496] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1377.373538] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000041c0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000000680)=[@hopopts={{0x18}}, @rthdr_2292={{0x18}}], 0x30}}, {{&(0x7f0000000780)={0xa, 0x4e23, 0x0, @ipv4={[], [], @broadcast}}, 0x1c, 0x0}}], 0x2, 0x44) [ 1377.548310] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1377.563054] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1377.573896] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1377.580731] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1377.583443] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1377.590651] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:19 executing program 3: 06:28:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000212d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:19 executing program 3: 06:28:19 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_mount_image$hpfs(&(0x7f0000000100)='hpfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000300)="b6970ed3e86aa3ac8b8ff8adb50925613b0e8514ae91990b89e7712bf3ad16f7f5ff6482b93fe3a5b97a0af8c8705b613db2879f86ddf518f23499270a09b52e22cc8fc7ff9510e48f31b2b448103ae7be4e244d0f6f9fd131e2a2c9ca7a0619db7ea90c28eb9bf2dbc58c22cb50f924d73dc9e06fe8e2bfdcb5002937e74982a9ff21fedd52a3ab57e594a337794fe30831a32301a5820694f11148314a6bbd9d99e4dbc2ba97747f85f28093c79fe58e0addb07e10fcc4692165de369b5ccd7c5af22f07bfa0c365bed3ec1c1fc14f97d55db06ea6dcaccb5fbbe4da93417e3bb8989d1a7c6cf061c3", 0xea, 0x1}, {&(0x7f0000000200)="340260e5c742b9b611769d495f2e90381e0e1d67fac06e210b7f71de7a0caf53f8e104c082733e64728ae19fe85f0f3e", 0x30, 0x4}], 0x8, &(0x7f0000000640)=ANY=[@ANYBLOB="247d6e2f2c2e2c2f6465762f736e642f736571002c2b40bf5e5e2f285d2d212c2f6465762f736e642f736571002c2f6465762f736e642f736571002c736d61636b6673666c6f6f723d27262c61707072616973655f747970653d696d617369672c61707072616973655f747970653d696d617369672c7569643c", @ANYRESDEC=0x0, @ANYBLOB="2c636f6e746578743dfda70c63382e73797361646d5f752c61707072616973652c7569643e", @ANYRESDEC=0x0, @ANYBLOB=',appraise,uid>', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,\x00']) pwrite64(r0, &(0x7f0000000540)="fa7d02db2b00d50f4b0e2479c5aae65dc92e5b3f3b40f6e9c0a60695a3d12e0b2fd2d8a1bb59dbe9076340f1743e9b9473a3c91ccfbcf4494a29bd3ce869aab8a2e776f69bb0c8c6e90c15639135b72685892318c938618d726ca1ed97bfa2e7b9cce76a5432b2c725a032aa9fbe33f539bf36be8bf9e92b2cc0b0302df10cd7d082d7361fd6e65a6ecd86d1967602a5d016114eab226db5a80d312a563e70a97aa60dd83e82083bd8d153317e7cbfa8d9ee52f4cb5164bd0db47b41dd51eac0b9a35169c54c96f4aab0cd61af723c1131b179425dd16035663c5274b19cf992b84122f662f99588904f366f", 0xec, 0x3f) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e24, 0x400, @loopback, 0xffffff7f}, {0xa, 0x4e23, 0x5, @remote, 0x70d}, 0x9, [0x5, 0x8, 0x3, 0x1, 0x81, 0x28, 0x5be, 0x9d]}, 0x5c) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000009030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1377.765994] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1377.773355] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:19 executing program 3: 06:28:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x264c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:19 executing program 3: 06:28:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1377.942542] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1377.963326] hpfs: bad mount options. [ 1377.976576] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:19 executing program 3: [ 1378.067668] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1378.075204] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1378.106388] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:19 executing program 3: [ 1378.116347] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26500, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1378.188298] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1378.196086] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:20 executing program 3: [ 1378.244428] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1378.251931] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000222d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000c030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1378.400100] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1378.408912] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1378.598171] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1378.605056] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1378.617119] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1378.628697] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1378.688663] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1378.695670] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1378.710784] hpfs: bad mount options. [ 1378.715146] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1378.724730] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:20 executing program 3: 06:28:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26540, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:20 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200000, 0x0) ioctl$KDFONTOP_COPY(r4, 0x4b72, &(0x7f0000000080)={0x3, 0x0, 0xc, 0x9, 0xc1, &(0x7f0000000540)}) r5 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000232d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:20 executing program 3: [ 1378.823022] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1378.835838] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1378.893809] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1378.905637] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:20 executing program 3: 06:28:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000410030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1378.938442] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1378.949715] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:20 executing program 3: [ 1379.004856] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1379.016995] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26580, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:20 executing program 3: [ 1379.146098] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1379.174133] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:20 executing program 3: 06:28:21 executing program 3: 06:28:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300002c2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1379.283309] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1379.283858] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1379.308806] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1379.320154] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1379.501072] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1379.509656] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1379.613381] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1379.623849] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1379.637679] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1379.662179] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:21 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x5, 0x20000) ioctl$SNDCTL_DSP_GETFMTS(r5, 0x8004500b, &(0x7f0000000080)=0x2) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:21 executing program 3: 06:28:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x265c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:21 executing program 3: 06:28:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000001f030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1379.831491] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1379.838634] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:21 executing program 3: [ 1379.932683] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300002d2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1379.974405] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1379.982375] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:21 executing program 3: [ 1380.021886] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1380.142853] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1380.175671] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:21 executing program 3: 06:28:21 executing program 3: [ 1380.189770] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1380.196903] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1380.207547] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1380.217962] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1380.478134] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1380.485125] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26600, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:22 executing program 3: 06:28:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000020030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:22 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = signalfd4(r1, &(0x7f0000000040)={[0x509]}, 0x8, 0x1800) ioctl$RTC_PIE_OFF(r2, 0x7006) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000800, 0x10000020000000fb], 0x100000, 0x200400}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000000080)=@v1={0x0, @adiantum, 0x4, "9e87630b7e5cb448"}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000100)={0x800, 0x3, 0x3, 0x3ff, 0x2, "2b64250160bd56bc"}) 06:28:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000602d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:22 executing program 3: [ 1380.847659] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1380.869988] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1380.895846] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1380.924116] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1380.933721] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:22 executing program 3: [ 1380.985847] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000000250000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26640, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:22 executing program 3: 06:28:22 executing program 3: [ 1381.160407] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1381.177358] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:22 executing program 3: [ 1381.247120] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1381.254240] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000021030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:23 executing program 3: [ 1381.294049] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1381.318405] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1381.430915] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1381.438702] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1381.471599] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1381.484400] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1381.508294] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1381.522600] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1381.674321] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1381.683233] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:23 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x2}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_GET(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000010701080000000000020000030000030c00034000000000000900010073797a3000000000"], 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x200c000) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:23 executing program 3: 06:28:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000100000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26680, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000022030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:23 executing program 3: [ 1381.877725] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1381.894581] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1381.897524] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1381.915353] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:23 executing program 3: [ 1381.932300] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1381.942607] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:23 executing program 3: [ 1382.045268] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1382.070768] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:23 executing program 3: 06:28:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1382.098461] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1382.105686] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1382.123207] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1382.124790] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000023030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1382.401404] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1382.412817] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1382.485344] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1382.496516] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:24 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$pppl2tp(0x18, 0x1, 0x1) fsetxattr(r4, &(0x7f0000000040)=@random={'osx.', '&.'}, &(0x7f0000000080)='2]&/^\x00', 0x6, 0x3) r5 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:24 executing program 3: 06:28:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x266c0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000200000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000002c030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:24 executing program 3: [ 1382.853902] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1382.864046] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1382.870771] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1382.886271] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1382.897107] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1382.930017] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:24 executing program 3: [ 1382.970371] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1382.983575] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:24 executing program 3: 06:28:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000300000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1383.073526] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1383.081833] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1383.111701] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:24 executing program 3: [ 1383.139010] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1383.288028] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1383.300875] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1383.376080] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1383.385421] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:25 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = signalfd4(r5, &(0x7f0000000000)={[0x5]}, 0x8, 0x800) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000900)={0x1, [0x0]}, &(0x7f0000000940)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f00000000c0)={r9, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000080)={r9, 0x7ff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000040)={r9, 0x5a, "76af25fd7f63f8a001a0ecace9630a75d906e4c28085dd5d3c21f8dd50546cb969ab55bf81bef71f3d642c23b9f86acb549dbcc52fb59582392cc6d7a4792423fb3d04f4b5d4a3fcba9c8bcd8853b41ef89c4ed9134b331add58"}, &(0x7f0000000100)=0x62) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 06:28:25 executing program 3: 06:28:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000002d030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26700, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000400000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:25 executing program 3: [ 1383.826629] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1383.833816] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1383.851175] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1383.864211] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000003f030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:25 executing program 3: [ 1383.887025] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1383.893026] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:25 executing program 3: [ 1383.998643] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1384.012610] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1384.013434] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1384.040173] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:25 executing program 3: [ 1384.216786] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1384.232660] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1384.334599] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1384.344839] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26710, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000500000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:26 executing program 3: 06:28:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000040030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xffff1f0000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1384.743852] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1384.754017] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1384.782482] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:26 executing program 3: [ 1384.800434] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1384.820622] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:26 executing program 3: [ 1384.843517] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) 06:28:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26711, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1384.909832] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1384.923112] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1384.934574] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1384.938181] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:26 executing program 3: 06:28:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000060030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000600000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:26 executing program 3: 06:28:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:26 executing program 3: 06:28:27 executing program 3: [ 1385.266517] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1385.284397] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1385.371344] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1385.380307] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1385.400916] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1385.408405] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:27 executing program 3: [ 1385.415782] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (38 blocks) [ 1385.426391] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000700000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2f950, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:27 executing program 3: [ 1385.555975] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1385.583533] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:27 executing program 3: 06:28:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000fff030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:27 executing program 3: [ 1385.842036] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1385.854904] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:27 executing program 3: [ 1385.927641] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1385.934888] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (47 blocks) 06:28:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x30000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:27 executing program 3: [ 1386.010154] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1386.020561] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000800000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:27 executing program 3: [ 1386.126457] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1386.133534] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1386.140134] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1386.152338] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (48 blocks) 06:28:28 executing program 3: [ 1386.317738] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1386.343914] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1386.351699] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:28 executing program 3: [ 1386.386672] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1386.386890] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1386.403817] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (48 blocks) 06:28:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000003c000000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40002, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1386.536318] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1386.543222] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:28 executing program 3: 06:28:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000900000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1386.693564] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1386.703350] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1386.721331] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:28 executing program 3: [ 1386.751229] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1386.797568] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1386.810296] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1386.835507] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:28 executing program 3: [ 1386.860198] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000002030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:28 executing program 3: [ 1387.031348] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1387.081297] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000a00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:28 executing program 3: [ 1387.158759] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1387.175583] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000003030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1387.256165] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1387.320939] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:29 executing program 3: 06:28:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000b00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1387.398636] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1387.471565] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1387.508057] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:29 executing program 3: [ 1387.521715] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:29 executing program 3: [ 1387.655496] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1387.682607] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1387.706692] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1387.716162] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1387.730007] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1387.737478] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:29 executing program 3: 06:28:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40005, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000004030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:29 executing program 3: 06:28:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000c00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:29 executing program 3: [ 1388.084932] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1388.097928] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1388.111721] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1388.121096] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1388.129752] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:29 executing program 3: [ 1388.161066] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40006, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1388.282112] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1388.296478] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1388.308690] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:30 executing program 3: 06:28:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1388.343912] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000d00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000005030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:30 executing program 3: [ 1388.547367] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1388.564353] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40007, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:30 executing program 3: [ 1388.732199] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1388.733961] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1388.756227] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1388.759915] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:30 executing program 3: 06:28:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1388.907104] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1388.932951] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1388.941562] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:30 executing program 3: [ 1388.964087] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1389.017697] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1389.027094] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000e00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40008, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000006030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:30 executing program 3: 06:28:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1389.277053] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1389.283946] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1389.319515] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1389.349215] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:31 executing program 3: [ 1389.367506] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40009, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1389.396964] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1389.405433] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1389.425561] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:31 executing program 3: 06:28:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000007030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1389.586071] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1389.592929] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:31 executing program 3: 06:28:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0200000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:31 executing program 3: [ 1389.785979] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1389.842551] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1389.853254] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1389.854814] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000c, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1389.892510] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1389.909790] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:31 executing program 3: 06:28:31 executing program 3: 06:28:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0300000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1390.127962] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1390.160302] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:31 executing program 3: [ 1390.240670] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1390.280124] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000009030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40010, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:32 executing program 3: [ 1390.283522] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1390.313698] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1390.454775] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1390.464758] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1390.473985] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1390.485015] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x8}]}}, &(0x7f0000000300)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 06:28:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000021030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0400000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1390.637020] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1390.681278] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:32 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/fib_triestat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000004700)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000017c0)=""/1, 0x1}], 0x1}}], 0x1, 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f00000005c0)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1be, 0x0, 0x0) 06:28:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40021, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1390.781546] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1390.793520] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:32 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/fib_triestat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000004700)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000017c0)=""/1, 0x1}], 0x1}}], 0x1, 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f00000005c0)) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1be, 0x0, 0x0) [ 1390.859522] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1390.869045] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1390.994452] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1391.012465] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1391.033510] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1391.040859] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0500000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:32 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000040)='freezer.state\x00', 0x2, 0x0) [ 1391.068398] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1391.081659] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000022030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40022, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x80, 0xa0, 0xe547e48}, 0x40) [ 1391.230690] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1391.246046] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1391.378762] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1391.395596] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1391.406266] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0600000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1391.431802] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x22, &(0x7f0000000400), 0x4) [ 1391.556167] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1391.564085] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1391.576479] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1391.583331] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1391.592014] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:33 executing program 3: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGPGRP(r0, 0x5420, 0x0) [ 1391.614190] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000023030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40023, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000003bc0)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x24, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 06:28:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x25, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1391.780994] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1391.794840] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0700000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000640)) [ 1391.964605] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1391.973481] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1392.001365] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 1392.113308] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1392.130874] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1392.151487] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/189, 0x1a, 0xbd, 0x1}, 0x20) [ 1392.164577] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1392.175669] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1392.190904] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000002c030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4002c, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'ipvlan1\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="1e"]}) 06:28:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x63, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1392.405517] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1392.433139] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1392.450332] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1392.470451] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:34 executing program 3: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x80}) 06:28:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0900000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1392.509705] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1392.526928] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4002d, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffff, 0x4) bind$inet(r0, &(0x7f0000000940)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) syz_genetlink_get_family_id$tipc2(0x0) [ 1392.669186] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1392.681039] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1392.702293] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1392.710067] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1392.731539] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1392.756037] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000002d030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1392.807310] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d2100000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1392.882148] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:34 executing program 3: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGPGRP(r0, 0x540b, 0x0) 06:28:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40056, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1393.047691] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1393.080947] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x3, &(0x7f0000000400), 0x4) [ 1393.100329] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1393.122225] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2000019b}, {}]}]}}, &(0x7f0000000100)=""/208, 0x36, 0xd0, 0x1}, 0x20) [ 1393.273419] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1393.282456] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1393.296187] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1393.300501] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1393.313911] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f00000003c0)=""/254, 0x32, 0xfe, 0x1}, 0x20) [ 1393.342722] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d2200000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3b1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000060030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x88, &(0x7f00000000c0)=""/136, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:28:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40060, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000500)={0x14, r1, 0x1, 0x0, 0x0, {0x2e}}, 0x14}}, 0x0) [ 1393.686660] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1393.693620] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1393.712711] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1393.726896] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r1, &(0x7f0000004200)="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", 0x2000, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000cc0)="e1", 0x8d000}], 0x1) dup3(r0, r1, 0x0) [ 1393.885628] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1393.896806] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1393.896811] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1393.911971] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1393.922770] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1393.929282] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000070000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d2300000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3c00, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40068, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:35 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x10b382) r1 = memfd_create(0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x0) pwritev(r1, 0x0, 0x0, 0x81805, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4000000, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24002d00) [ 1394.096460] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1394.103335] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1394.266496] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1394.284019] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1394.302443] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "88"}]}}, &(0x7f00000001c0)=""/189, 0x18, 0xbd, 0x1}, 0x20) [ 1394.325768] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000140000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1394.393111] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1394.408840] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1394.412280] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1394.440015] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4013c, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d2c00000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:36 executing program 3: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGPGRP(r0, 0x5425, 0x0) [ 1394.603064] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1394.630148] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "88"}]}}, &(0x7f00000001c0)=""/189, 0xfffffffffffffd78, 0xbd}, 0x20) [ 1394.713416] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1394.739833] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1394.744987] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1394.755893] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1394.776145] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1394.809239] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8911, &(0x7f0000000280)={'batadv_slave_0\x00', 0x0}) 06:28:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d2d00000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1394.971859] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1394.980959] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1394.994228] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7000, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40150, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000210000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8915, &(0x7f0000000040)={'veth1_to_bond\x00', @ifru_names}) 06:28:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d6000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:37 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1395.368420] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1395.376176] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1395.400692] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1395.411299] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1395.424662] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1395.473411] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0003000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1395.530134] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1395.545356] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc0189436, 0x0) 06:28:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40198, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000002230000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000001c0)=@ethtool_perm_addr={0x20, 0x10, "3781884ea33380eb120f9d9a09d55b92"}}) [ 1395.657975] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1395.672207] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d1004000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1395.839094] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1395.879121] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1395.889286] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1395.921679] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1395.970787] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1395.990212] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1396.155264] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1396.162142] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1396.185029] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:38 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9900, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:28:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401b8, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000002d0000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0005000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x18, &(0x7f0000000400), 0x4) [ 1396.393917] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1396.421986] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1396.443822] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1396.447232] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1396.465363] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1396.487609] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000400)=0x300, 0x4) 06:28:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401f8, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1396.631921] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1396.641954] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1396.653605] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1396.656323] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8923, &(0x7f00000000c0)={'ipvlan1\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="1e"]}) 06:28:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000410000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0006000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1396.904794] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1396.913884] €: renamed from ipvlan1 [ 1396.942129] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000080)={0x4}) [ 1397.028957] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1397.050760] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1397.063173] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1397.088234] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1397.208287] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1397.220172] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1397.229512] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1397.245196] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:39 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9a00, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40233, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x1, &(0x7f0000000040)=@raw=[@generic={0x89}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:28:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0007000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000004b0000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x24048080) [ 1397.507955] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1397.535429] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1397.557816] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1397.570360] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1397.617695] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1397.649210] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4025a, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0009000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@getchain={0x23, 0x25, 0xd}, 0x24}}, 0x0) 06:28:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000003d00000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1397.876705] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1397.916776] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}, 0xa}, 0x0) [ 1397.938715] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1397.954145] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1397.976282] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1398.000453] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1398.018368] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1398.036417] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402b7, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1398.061154] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1398.081211] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1398.313506] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1398.359214] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:40 executing program 3: getitimer(0x0, &(0x7f00000005c0)) 06:28:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0410000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000007fff0000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402dc, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000000100)=""/208, 0x1a, 0xd0, 0x1}, 0x20) [ 1398.667428] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1398.703020] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1398.712483] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1398.732741] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1398.746450] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1398.759754] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x28}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x17, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) close(r0) 06:28:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40300, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1398.883578] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1398.891537] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1398.906214] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1398.907940] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0020000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000020000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:40 executing program 3: ioprio_set$uid(0x0, 0x0, 0xc199c402cfefad4c) [ 1399.117386] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1399.138679] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1399.170860] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1399.180430] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:40 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0xf4240, &(0x7f00000001c0)=@raw=[@generic], &(0x7f0000000240)='syzkaller\x00', 0x0, 0xe3, &(0x7f0000000280)=""/227, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1399.245129] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1399.258307] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1399.269888] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1399.271431] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1399.441620] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1399.461324] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40342, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x2a, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "88"}]}}, &(0x7f00000001c0)=""/189, 0x2a, 0xbd, 0x1}, 0x20) 06:28:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0021000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000040000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:41 executing program 3: clock_adjtime(0x0, &(0x7f0000000000)={0x1f}) [ 1399.770911] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1399.784327] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1399.825096] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1399.842261] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1399.858563] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1399.900038] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x8, [@var={0x6, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000300)=""/4096, 0x30, 0x1000, 0x1}, 0x20) [ 1399.944963] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1399.954421] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000070000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403b0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1400.059970] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1400.076149] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0022000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:41 executing program 3: timer_create(0x3, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000080)) [ 1400.194301] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1400.229236] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1400.309949] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1400.317928] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1400.325113] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1400.335582] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1400.342571] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f00000000c0)=""/207, 0x26, 0xcf, 0x1}, 0x20) [ 1400.356448] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1400.501691] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1400.519376] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff88809f6a0b98, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000100000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403c4, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 06:28:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0023000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1400.765751] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1400.767629] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1400.785645] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1400.811917] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x8, &(0x7f0000000400), 0x4) [ 1400.880951] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1400.913601] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1400.931188] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1400.938352] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1400.949205] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1400.956793] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403de, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d002c000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000100)=""/208, 0x36, 0xd0, 0x1}, 0x20) 06:28:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000140000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1401.212766] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1401.225548] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x7, &(0x7f0000000400), 0x4) [ 1401.334523] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1401.343872] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1401.344013] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1401.358805] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1401.394483] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d002d000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1401.448927] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff88809f6a11f8, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000210000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000500)={0x4c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0x38, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5}}]}, 0x4c}}, 0x0) 06:28:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403f0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1401.645068] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1401.659222] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1401.720929] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1401.734212] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:43 executing program 3: [ 1401.843353] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1401.845281] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1401.872989] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d003f000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1401.888302] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:43 executing program 3: 06:28:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403f6, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1401.974606] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1401.985171] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1402.003345] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000002d0000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:43 executing program 3: [ 1402.033418] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0040000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:43 executing program 3: [ 1402.216730] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1402.251346] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1402.260321] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1402.273140] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1402.293339] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1402.309677] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1402.420814] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1402.441231] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1402.448420] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1402.476500] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0343443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:44 executing program 3: 06:28:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403f7, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000410000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0060000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:44 executing program 3: [ 1402.782252] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1402.796635] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:44 executing program 3: [ 1402.827557] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1402.852209] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1402.866116] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1402.871077] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:44 executing program 3: [ 1402.908337] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40410, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1403.053527] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1403.065903] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1403.079559] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1403.096461] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:44 executing program 3: 06:28:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000004b0000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1403.122052] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0443443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:45 executing program 3: 06:28:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0fff000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:45 executing program 3: [ 1403.416012] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1403.422902] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1403.449102] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1403.480630] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1403.516461] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000230200002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:45 executing program 3: [ 1403.530069] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1403.541854] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:45 executing program 3: [ 1403.580049] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40500, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:45 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0743443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:45 executing program 3: [ 1403.674690] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1403.681567] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1403.687651] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1403.699490] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000001000000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1403.882959] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1403.901288] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1403.909052] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:45 executing program 3: [ 1403.929847] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1403.955372] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1403.979376] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1403.997259] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:45 executing program 3: 06:28:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000d00300002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1404.007078] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40600, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:45 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0843443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:46 executing program 3: [ 1404.355338] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1404.365690] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1404.382786] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1404.390051] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:46 executing program 3: [ 1404.412799] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000002100000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1404.479925] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1404.500463] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1404.518504] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:46 executing program 3: [ 1404.547090] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1404.559823] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000003c00002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:46 executing program 3: 06:28:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0a43443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40700, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1404.758743] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1404.778999] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1404.797252] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:46 executing program 3: [ 1404.809279] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:46 executing program 3: [ 1404.956111] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1404.963497] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1404.973355] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1404.973372] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1404.992553] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1404.993064] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:46 executing program 3: [ 1405.013085] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40900, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000000a0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000002d00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:46 executing program 3: [ 1405.133536] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:47 executing program 3: 06:28:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="1043443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1405.304650] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1405.329474] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1405.338961] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:47 executing program 3: [ 1405.373093] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1405.429053] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1405.432477] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1405.444492] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1405.460915] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:47 executing program 3: 06:28:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40c00, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000000250000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1405.490650] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="1443443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1405.586313] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1405.605564] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:47 executing program 3: 06:28:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0002000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1405.725289] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1405.732225] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1405.759454] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:47 executing program 3: [ 1405.777154] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1405.787803] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1405.812684] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:47 executing program 3: [ 1405.831046] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1405.934151] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1405.946242] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1405.973219] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41004, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:47 executing program 3: [ 1405.975763] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1405.991506] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030200002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:47 executing program 3: 06:28:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="2243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0003000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:48 executing program 3: [ 1406.284952] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1406.302054] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1406.316406] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1406.323034] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1406.323384] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1406.359544] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1406.394245] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:48 executing program 3: 06:28:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41f00, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1406.409139] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1406.456653] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:48 executing program 3: 06:28:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030300002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1406.618151] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1406.627614] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1406.639590] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1406.655863] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1406.658424] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0004000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:48 executing program 3: 06:28:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="4443443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1406.776769] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1406.798745] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:48 executing program 3: [ 1406.896530] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1406.921354] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1406.941085] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1406.942249] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1406.983168] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="4843443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:48 executing program 3: [ 1406.991717] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1407.000602] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030400002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1407.146759] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1407.164358] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1407.181166] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42100, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:48 executing program 3: [ 1407.193072] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1407.204481] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:49 executing program 3: 06:28:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0005000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="8843443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1407.402418] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1407.414664] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1407.436526] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:49 executing program 3: 06:28:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030500002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:49 executing program 3: [ 1407.554829] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1407.583760] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42200, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:49 executing program 3: [ 1407.679552] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1407.691652] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1407.714094] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1407.728814] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1407.730882] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:49 executing program 3: [ 1407.836513] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1407.876880] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1407.890654] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1407.898695] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1407.903722] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1407.915870] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030600002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:49 executing program 3: [ 1407.926793] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0006000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:49 executing program 3: 06:28:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0209443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42300, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:49 executing program 3: [ 1408.224912] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1408.232300] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1408.239510] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1408.255238] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:50 executing program 3: 06:28:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0007000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:50 executing program 3: [ 1408.385456] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1408.399035] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1408.414200] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1408.424404] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:50 executing program 3: [ 1408.458362] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030700002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:50 executing program 3: 06:28:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42c00, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1408.544653] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1408.555075] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1408.569400] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0225443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:50 executing program 3: [ 1408.760091] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1408.780379] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1408.789676] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:50 executing program 3: [ 1408.805834] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:50 executing program 3: 06:28:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x6, 0x0, 0x6}, 0x40) [ 1408.931230] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1408.939123] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1408.946874] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1408.970697] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0009000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1409.005405] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:50 executing program 3: 06:28:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030800002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42d00, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:50 executing program 3: [ 1409.180146] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:51 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243023030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1409.273620] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1409.285260] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:51 executing program 3: [ 1409.332561] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1409.348922] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1409.432968] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1409.450325] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1409.451049] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1409.467848] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1409.479980] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1409.498998] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1409.517686] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:51 executing program 3: 06:28:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0021000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1409.588838] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030900002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:51 executing program 3: 06:28:51 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243213030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43302, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:51 executing program 3: [ 1409.864636] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1409.872076] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1409.879418] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1409.894469] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1409.907968] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:51 executing program 3: [ 1409.936917] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43c01, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:51 executing program 3: [ 1410.011426] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1410.033872] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1410.040851] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1410.047983] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1410.054158] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:51 executing program 3: 06:28:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030c00002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0022000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1410.334984] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:52 executing program 3: 06:28:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243223030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1410.404631] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1410.420889] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1410.421137] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:52 executing program 3: [ 1410.476552] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1410.480453] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1410.491278] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1410.495334] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1410.512157] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0023000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43f00, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1410.609029] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1410.640372] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1410.653072] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:52 executing program 3: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x0, 0xffffffff}) 06:28:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000032100002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243233030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:52 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg(r0, &(0x7f0000001d00)={0x0, 0x0, 0x0}, 0x0) [ 1410.786557] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1410.797783] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1410.887083] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1410.924911] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:52 executing program 3: r0 = socket(0x11, 0xa, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x14}}, 0x0) [ 1410.942165] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1410.959437] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1410.979407] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1411.006865] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d002c000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) [ 1411.062030] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x44000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1411.194916] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1411.202998] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1411.217834] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243253030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005e80)={0x0, 0x0, &(0x7f0000005e40)={0x0}}, 0x0) 06:28:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000032200002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1411.328131] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1411.336675] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1411.357125] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1411.364152] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x44203, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:53 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00'}, 0x10) [ 1411.477280] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1411.490089] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1411.508045] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1411.520765] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1411.525574] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000001240)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)=[@txtime={{0x18}}], 0x18}}], 0x1, 0x0) 06:28:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d002d000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1411.696501] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1411.722706] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1411.735609] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1411.746152] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x45001, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:53 executing program 3: add_key$user(&(0x7f0000000140)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) [ 1411.791377] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243863030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000032300002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:53 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0285629, &(0x7f0000000040)) [ 1412.007288] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1412.023402] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1412.053374] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1412.087719] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1412.112603] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1412.119764] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:53 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0xffc}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x6]}, 0x8}) 06:28:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0060000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x45600, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1412.214122] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1412.214128] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1412.221584] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:54 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20004040) [ 1412.354692] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1412.379059] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1412.393500] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000030f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1412.393831] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1412.409513] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1412.440079] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000032c00002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1412.492638] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:54 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x224002) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 06:28:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243883030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x45a02, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1412.623747] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1412.645793] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:54 executing program 3: [ 1412.728664] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1412.739246] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1412.776133] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1412.789073] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1412.809666] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:54 executing program 3: [ 1412.830306] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1412.844280] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1412.858364] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:28:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000032d00002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1412.888494] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:54 executing program 3: 06:28:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0010040f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1413.006985] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:54 executing program 3: [ 1413.054602] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1413.080622] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243442530310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x46000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1413.119643] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1413.135631] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:54 executing program 3: [ 1413.282043] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1413.306861] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:55 executing program 3: [ 1413.328912] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1413.336941] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000036000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000050f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1413.425724] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1413.434341] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1413.456231] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:55 executing program 3: 06:28:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x46800, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:55 executing program 3: [ 1413.627507] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443025310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1413.738430] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1413.747823] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1413.774122] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000060f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1413.804522] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:55 executing program 3: [ 1413.937372] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1413.956013] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:55 executing program 3: 06:28:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x49801, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1413.985631] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 [ 1414.007894] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1414.025040] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:55 executing program 3: 06:28:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030003002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1414.130557] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1414.147219] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1414.170190] isofs_fill_super: bread failed, dev=loop2, iso_blknum=34, block=68 06:28:56 executing program 3: 06:28:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310200004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:56 executing program 3: [ 1414.386783] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1414.417188] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000070f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1414.438565] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1414.443497] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1414.473205] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:56 executing program 3: [ 1414.498919] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4b003, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:56 executing program 3: [ 1414.648003] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1414.660992] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:56 executing program 3: 06:28:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000031004002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:56 executing program 3: [ 1414.825341] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1414.848337] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310300004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1414.991608] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1415.000844] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1415.008161] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1415.019382] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1415.031740] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:56 executing program 3: [ 1415.044328] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000090f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1415.164557] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1415.171422] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4b702, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:57 executing program 3: 06:28:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030005002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1415.336690] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1415.352337] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:57 executing program 3: [ 1415.483553] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1415.503035] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1415.510288] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:57 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310400004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1415.531031] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1415.544889] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1415.551774] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:57 executing program 3: 06:28:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0004100f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4b801, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1415.667519] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1415.681910] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:57 executing program 3: 06:28:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030006002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:57 executing program 3: [ 1415.941816] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1415.956239] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1415.968188] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1415.985493] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:57 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310800004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1415.988745] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1416.012360] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:57 executing program 3: [ 1416.154168] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1416.161489] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1416.182712] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:28:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c403, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20004010) [ 1416.210995] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030007002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000200f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x400c800) [ 1416.466671] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1416.496623] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1416.523262] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1416.562477] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:28:58 executing program 3: open$dir(&(0x7f0000000200)='.\x00', 0x80, 0x0) [ 1416.576911] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1416.593319] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310900004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1416.637238] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1416.677195] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030009002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4dc02, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x800) [ 1416.833066] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1416.846177] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:28:58 executing program 3: r0 = socket(0x11, 0xa, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 1416.893917] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1416.909257] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000210f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:58 executing program 3: r0 = socket(0x1, 0x5, 0x0) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) [ 1417.037874] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1417.063357] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1417.149787] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1417.160799] EXT4-fs (loop4): Can't read superblock on 2nd try 06:28:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4de03, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310f00004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000c002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:59 executing program 3: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x80000}, 0x0, 0x0, 0x0) [ 1417.389091] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1417.391410] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1417.407589] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1417.434480] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x40000) [ 1417.543256] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1417.563833] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1417.571996] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1417.590723] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1417.637222] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1417.644102] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:59 executing program 3: r0 = socket(0x1, 0x5, 0x0) getsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) 06:28:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f003, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030311000004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:28:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030410002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000220f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:59 executing program 3: pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x3938700}, 0x0) [ 1417.936550] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1417.961202] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1417.971825] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1418.009960] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1418.027845] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1418.043887] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1418.045199] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1418.056844] EXT4-fs (loop5): Can't read superblock on 2nd try 06:28:59 executing program 3: r0 = socket(0x1, 0x5, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:28:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f603, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:28:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000230f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1418.177089] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1418.196095] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030311400004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000200)) 06:29:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003001f002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1418.412606] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1418.420057] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1418.431243] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1418.447521] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20044800) 06:29:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f703, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d00002c0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1418.499041] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1418.512476] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030312500004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:00 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={0x0}}, 0xc800) [ 1418.656068] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1418.682946] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1418.683030] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1418.689857] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030020002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1418.703434] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f801, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xfffffffffffffde9}}, 0x0) [ 1418.780109] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d00002d0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1418.853558] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1418.860438] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:00 executing program 3: r0 = socket(0x11, 0x3, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={0x0}}, 0x0) 06:29:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030021002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1419.080295] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1419.117942] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030316300004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:00 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000240)={{}, {0x0, @local}, 0x0, {0x2, 0x0, @empty}, 'veth0_macvtap\x00'}) [ 1419.131991] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1419.155986] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x840) 06:29:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4ff0f, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1419.263488] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1419.275539] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1419.296906] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1419.305158] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, 0x0, 0x0) 06:29:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310003004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d00003f0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1419.438288] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1419.464710] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030022002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1419.514202] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1419.554893] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1419.899297] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1419.906567] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1419.920367] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1419.943172] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1419.974194] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000400f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:01 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) [ 1420.016128] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:01 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$CHAR_RAW_PG(r0, 0x1269, 0x0) 06:29:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031b103004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1420.184019] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1420.191073] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030023002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:02 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x8842, 0x0) write$vga_arbiter(r0, &(0x7f0000000340)=@unlock_all='unlock all\x00', 0xb) [ 1420.355533] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1420.363461] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1420.410638] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1420.419989] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1420.431712] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:02 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 06:29:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031003c004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1420.476391] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1420.545590] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1420.556854] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000600f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x88c0) [ 1420.688305] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1420.697571] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003002c002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:02 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) [ 1420.883726] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1420.901023] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0xc000) 06:29:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1420.958570] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1420.990881] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:02 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/null\x00', 0x0, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r0, 0x0, 0x0) 06:29:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310070004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1421.128846] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1421.138887] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1421.152698] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1421.164803] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1421.178898] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1421.210461] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1421.254307] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1421.266097] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x40) 06:29:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d000fff0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003002d002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000640)=""/255, &(0x7f0000000080)=0xff) [ 1421.519360] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1421.559217] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:03 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000f00)='freezer.state\x00', 0x2, 0x0) 06:29:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1040000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310099004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1421.643285] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1421.650174] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_LISTALL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x20000010) [ 1421.723206] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1421.736916] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x90) [ 1421.903295] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1421.903674] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1421.910181] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000300000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1421.998050] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1422.017274] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1422.040446] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:03 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0xb1aedb28e28f08ff, 0x80) 06:29:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003003f002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1422.140307] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1422.162322] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x50000) 06:29:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031009a004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1422.372254] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x4004044) [ 1422.416737] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1422.424021] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1422.431276] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x2404c040) [ 1422.502737] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1422.519855] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000500000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1422.574537] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1422.581430] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:04 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, 0x0) 06:29:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030040002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1422.832986] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310102004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1422.881108] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x4000008) [ 1423.001920] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1423.008507] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1423.021305] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1423.021339] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1423.053092] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1423.082673] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1423.107698] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1423.112075] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000600000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x1) 06:29:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030060002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1423.291837] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1423.307884] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:05 executing program 3: r0 = socket(0x1, 0x5, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) [ 1423.473432] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1423.483484] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1423.495316] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1423.498308] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310103004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:05 executing program 3: sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0xc90b5d79fff9355a) [ 1423.526290] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1423.537965] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1423.567129] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1423.588899] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000700000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:05 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0}}, 0x0) 06:29:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030fff002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000010) [ 1423.889974] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1423.892659] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1423.923650] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003c00)={{{@in6=@remote}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000003d00)=0xfffffe86) [ 1423.932603] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1423.935334] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1423.955429] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310104004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000000410000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1424.077847] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1424.099857] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:05 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ubi_ctrl\x00', 0x0, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, 0x0, 0x0) 06:29:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000900000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1424.245926] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1424.257187] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:06 executing program 3: timer_create(0x0, &(0x7f0000000a40), 0x0) [ 1424.385872] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1424.397876] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1424.423614] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310105004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1424.444746] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1424.466548] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1424.483478] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 06:29:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000004b0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1424.632575] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1424.653798] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:06 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x20c1, 0x0) 06:29:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000a00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310106004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={0x0}}, 0x6000) [ 1424.973156] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1424.980972] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1424.991501] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1425.002182] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1425.010766] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:06 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, 0x0, 0x0) [ 1425.027651] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310107004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1425.172979] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1425.185266] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1425.196911] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1425.215987] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030002002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000b00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:07 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, 0x0) 06:29:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x24000084) [ 1425.479230] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1425.498303] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1425.508440] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1425.509231] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x804) [ 1425.530026] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1425.543010] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310108004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030003002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1425.637179] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1425.711355] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000c00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x4) 06:29:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310109004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1425.910469] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1425.922674] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x804) [ 1426.002787] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1426.020648] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030004002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1426.054646] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000d00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x40894) [ 1426.107855] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:07 executing program 3: r0 = socket(0x11, 0x3, 0x0) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) [ 1426.244258] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1426.253536] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1426.259530] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1426.271032] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4000000) 06:29:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031010c004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1426.445032] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1426.451908] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1426.459002] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1426.478074] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030005002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000) [ 1426.488035] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1426.494578] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000e00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310122004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:08 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) sendmsg$NET_DM_CMD_START(r0, 0x0, 0x0) [ 1426.737258] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1426.771483] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x8000) [ 1426.883342] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1426.890217] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1426.962846] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1426.969820] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1426.982945] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1426.997253] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x4000004) [ 1427.010277] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1427.026748] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030006002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000020f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x80bc52ae7a0f5b24) 06:29:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310123004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1427.346237] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1427.367087] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:09 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, 0x0) [ 1427.427587] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1427.434598] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1427.447494] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1427.494649] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1427.495972] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1427.530054] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x40000) [ 1427.573303] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1427.582316] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000030f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030007002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031012c004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4004040) [ 1427.899268] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1427.942397] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1427.995771] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1428.017911] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1428.027781] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:09 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROSET(r0, 0x125d, 0x0) [ 1428.046498] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1428.047960] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1428.096129] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:09 executing program 3: r0 = socket(0x11, 0x3, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={0x0}}, 0x0) 06:29:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:10 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, 0x0) 06:29:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000040f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310148004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1428.231530] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1428.255417] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x4804) 06:29:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030008002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:10 executing program 3: r0 = socket(0x11, 0x3, 0x0) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={0x0}}, 0x0) [ 1428.582756] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1428.599812] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:10 executing program 3: [ 1428.683552] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1428.692839] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1428.703167] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1428.718503] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1428.745859] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1428.753972] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000050f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:10 executing program 3: 06:29:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031014c004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:10 executing program 3: [ 1428.902758] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1428.909636] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030009002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:10 executing program 3: [ 1429.093390] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1429.105905] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:10 executing program 3: [ 1429.197990] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1429.220812] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1429.229986] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1429.241310] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310168004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1429.254743] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1429.266746] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:11 executing program 3: 06:29:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000060f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:11 executing program 3: [ 1429.532855] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1429.543985] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1429.545594] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:11 executing program 3: [ 1429.575372] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000c002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:11 executing program 3: [ 1429.622519] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1429.649716] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1429.752751] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1429.770025] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:11 executing program 3: [ 1429.794887] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1429.804817] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:11 executing program 3: 06:29:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000070f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1429.939799] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1429.960446] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031016c004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1430.016545] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1430.032200] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:11 executing program 3: 06:29:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030021002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1430.192592] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1430.199476] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:12 executing program 3: [ 1430.315613] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1430.327910] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1430.345266] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:12 executing program 3: 06:29:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000090f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1430.359433] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1430.374223] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1430.396701] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:12 executing program 3: 06:29:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1430.552118] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1430.573999] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310174004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030022002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1430.672392] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1430.680581] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:12 executing program 3: 06:29:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1430.822512] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1430.836350] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:12 executing program 3: 06:29:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000210f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:12 executing program 3: [ 1430.995070] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1431.005485] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1431.039695] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:12 executing program 3: [ 1431.085122] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1431.146358] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1431.161034] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1431.169032] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1431.181004] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030023002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:13 executing program 3: 06:29:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031017a004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1431.353487] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1431.366087] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:13 executing program 3: 06:29:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000220f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1431.477313] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1431.487349] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1431.495693] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1431.508201] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:13 executing program 3: 06:29:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1431.581006] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1431.597091] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:13 executing program 3: 06:29:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003002c002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1431.710651] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1431.728144] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1431.735750] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100034c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:13 executing program 3: [ 1431.768833] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:13 executing program 3: [ 1431.859390] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1431.888393] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1431.900171] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1431.938694] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1431.992311] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1432.009426] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000230f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:13 executing program 3: 06:29:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003002d002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:14 executing program 3: 06:29:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100054c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1432.330992] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1432.342458] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1432.349305] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1432.349311] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1432.362494] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:14 executing program 3: [ 1432.385338] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1432.389872] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:14 executing program 3: [ 1432.429188] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030060002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1432.549334] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1432.571947] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:14 executing program 3: 06:29:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d00002c0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:14 executing program 3: 06:29:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100064c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:14 executing program 3: [ 1432.764756] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1432.781245] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1432.811453] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1432.831421] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1432.835178] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:14 executing program 3: [ 1432.858635] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1432.875618] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1432.888805] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000032d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:14 executing program 3: [ 1432.992473] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1433.003601] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d00002d0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100074c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1433.078847] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1433.094452] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:14 executing program 3: 06:29:15 executing program 3: [ 1433.195954] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1433.203443] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1433.205763] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1433.227436] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1433.230057] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:15 executing program 3: [ 1433.251574] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030010042d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1433.423771] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1433.430712] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100094c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:15 executing program 3: 06:29:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000600f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1433.520715] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1433.541491] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1433.639629] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1433.646759] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1433.651014] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:15 executing program 3: 06:29:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000052d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1433.687214] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:15 executing program 3: [ 1433.774749] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1433.795480] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1433.807820] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:15 executing program 3: [ 1433.829492] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1433.850206] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1433.862951] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430303101000c4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:15 executing program 3: 06:29:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000002100000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:15 executing program 3: 06:29:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1434.095828] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1434.126070] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:15 executing program 3: 06:29:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000062d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1434.213429] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1434.221852] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1434.249463] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1434.274711] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1434.316708] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1434.328390] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:16 executing program 3: 06:29:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000002d00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1434.442053] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1434.468452] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430303101001f4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:16 executing program 3: [ 1434.580667] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1434.594622] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1434.606183] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1434.614972] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:16 executing program 3: [ 1434.627564] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1434.642889] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:16 executing program 3: 06:29:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000072d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1434.849898] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1434.864047] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:16 executing program 3: 06:29:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000200000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100204c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:16 executing program 3: [ 1434.968379] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1434.998392] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1435.043025] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1435.064999] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:16 executing program 3: [ 1435.199611] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1435.202607] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1435.213302] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1435.237669] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:17 executing program 3: [ 1435.248507] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1435.263932] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:17 executing program 3: 06:29:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000092d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1435.402310] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1435.426274] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:17 executing program 3: 06:29:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000300000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100224c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:17 executing program 3: [ 1435.572767] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1435.581866] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:17 executing program 3: [ 1435.628910] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1435.638657] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:17 executing program 3: [ 1435.734575] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1435.741946] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1435.760137] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1435.770613] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:17 executing program 3: 06:29:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300000c2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:17 executing program 3: 06:29:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000400000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:17 executing program 3: [ 1435.963319] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1436.000813] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100234c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:17 executing program 3: [ 1436.049442] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1436.077075] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:17 executing program 3: 06:29:18 executing program 3: [ 1436.171780] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1436.182250] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1436.200210] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1436.215236] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:18 executing program 3: 06:29:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030004102d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:18 executing program 3: [ 1436.331114] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1436.352247] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1436.361342] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1436.370476] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:18 executing program 3: 06:29:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000500000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430303101002c4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1436.518312] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1436.532793] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:18 executing program 3: 06:29:18 executing program 3: [ 1436.700474] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1436.709218] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1436.717282] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1436.726866] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:18 executing program 3: [ 1436.808681] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1436.839779] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300001f2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:18 executing program 3: [ 1436.872690] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1436.911061] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430303101003f4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000600000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:18 executing program 3: 06:29:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:18 executing program 3: [ 1437.122949] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1437.129837] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000202d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1437.210019] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1437.218484] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:19 executing program 3: io_setup(0x2, &(0x7f00000000c0)) [ 1437.342180] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1437.377775] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1437.395977] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1437.422434] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100404c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:19 executing program 3: creat(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/mdstat\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) sendfile(r1, r0, 0x0, 0xff9) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, 0x0) [ 1437.441752] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1437.452864] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000700000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:19 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x18, &(0x7f0000004080)={@empty, @remote}, 0xc) 06:29:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000212d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:19 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_mreqn(r0, 0x0, 0x1600bd7c, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, 0xc) 06:29:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100484c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1437.846441] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1437.859154] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:19 executing program 3: 06:29:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000800000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1437.902727] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1437.940065] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:19 executing program 3: [ 1438.004527] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1438.028815] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1438.044474] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:19 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x15, &(0x7f0000004080)={@empty, @remote}, 0xc) [ 1438.102166] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1438.124084] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1438.146039] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430303101004c4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000222d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1438.326548] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1438.356807] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:20 executing program 3: rt_sigaction(0x12, &(0x7f0000000200)={&(0x7f0000000180)="660f1311a5bfcedccccc660f3a60d8138fe95890ea737cc6f822c0810800000099f73b0f1cbf0a000000", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000240)) [ 1438.381991] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1438.382042] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1438.406899] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1438.426271] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000900000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:20 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x21, 0x0, 0x0) 06:29:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1438.648969] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1438.668773] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100684c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1438.705762] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1438.738943] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:20 executing program 3: ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="cb43000000000000000007000000000000000000000008"], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000001}, 0x0) 06:29:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000232d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000a00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:20 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) [ 1439.037639] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1439.045347] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1439.066314] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0x8) syz_genetlink_get_family_id$batadv(0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='lock_acquire\x00', r3}, 0x10) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) dup2(r1, r1) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0x2) open$dir(0x0, 0x0, 0x0) [ 1439.085794] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1439.091963] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1439.100982] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1439.113888] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1439.149528] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x18, 0x0, 0x0) 06:29:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430303101006c4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300002c2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1439.273793] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1439.280761] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000b00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:21 executing program 3: ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) pipe(0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x3, 0x0) syz_open_dev$sg(&(0x7f0000000700)='/dev/sg#\x00', 0x3ff, 0x0) fchmodat(r0, &(0x7f0000000780)='./file0\x00', 0x0) [ 1439.439857] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1439.453952] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:21 executing program 3: sysfs$2(0x2, 0x8, &(0x7f0000000000)=""/244) [ 1439.600054] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1439.626017] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) getsockopt$inet_int(r0, 0x0, 0x3, 0x0, &(0x7f0000000040)) [ 1439.647365] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1439.666864] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1439.702561] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1439.719251] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300002d2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100744c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000002240)={0x8, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x104) 06:29:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x27}}, 0xc) [ 1439.921744] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1439.937894] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000c00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1440.103156] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1440.142701] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x21, &(0x7f0000004080)={@empty, @remote}, 0xc) [ 1440.166956] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1440.177175] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430303101007a4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x74) 06:29:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300003f2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1440.383785] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1440.390712] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:22 executing program 3: io_setup(0x1000, &(0x7f0000002500)=0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 1440.487713] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1440.497969] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1440.507397] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1440.531517] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1440.541157] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1440.550142] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000d00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000402d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x4044814, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) 06:29:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031010fff4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@dev, @private}, 0x10) 06:29:22 executing program 3: r0 = openat$vfio(0xffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x0) [ 1440.887758] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1440.888072] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1440.901196] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1440.911957] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1440.918050] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:22 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x4}, 0x40) [ 1440.970945] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1441.097520] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1441.105173] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1441.122595] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1441.131128] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:22 executing program 3: r0 = getpgrp(0xffffffffffffffff) ptrace$pokeuser(0x6, r0, 0x0, 0x0) 06:29:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000602d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) dup3(r2, r1, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic}) 06:29:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000e00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031010000250049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1441.487048] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1441.494519] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:23 executing program 3: socket$inet(0x2, 0x8000b, 0x0) [ 1441.532727] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1441.546175] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1441.559925] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1441.576508] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1441.709182] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1441.728746] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1441.745047] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1441.758771] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100024c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:23 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x19, &(0x7f0000004080)={@empty, @remote}, 0xc) 06:29:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000fff2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000001000000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:23 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) getsockopt$inet_int(r0, 0x0, 0x14, 0x0, &(0x7f0000000040)) 06:29:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x2) [ 1442.064224] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1442.082446] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1442.157590] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1442.174303] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:24 executing program 3: r0 = openat$random(0xffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x7, 0x41, "8759fcfdcfbcf05b1f216198d1dca5c844a7a4a95256cc9d15a31a204b8cfd9dc7a4840dea1a73cf2ede7ebada83da249add898d5a17711a4a5230dc492f70f3b0"}) [ 1442.217540] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1442.251781] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1442.258882] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1442.282192] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1442.295947] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1442.309701] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100034c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000000a0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:24 executing program 3: r0 = getpgrp(0x0) ioprio_get$pid(0x3, r0) 06:29:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000002100000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:24 executing program 3: r0 = openat$vfio(0xffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x3) [ 1442.580761] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1442.603379] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:24 executing program 3: r0 = openat$random(0xffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)) [ 1442.737203] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1442.745147] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1442.750147] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1442.759060] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:24 executing program 3: io_setup(0x2, &(0x7f00000000c0)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000100)={&(0x7f0000000080), 0x8}) [ 1442.793284] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000000250000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100044c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1442.848144] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1442.974214] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1443.005643] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1443.024942] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1443.053134] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000002d00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:24 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000040)=""/21, 0xa000, 0x1000}, 0x1c) [ 1443.145754] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1443.169631] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:24 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid_for_children\x00') [ 1443.269261] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1443.279136] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000022d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1443.343098] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1443.349991] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = dup3(r2, r1, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic}) 06:29:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100054c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000a000000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1443.442437] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1443.464344] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000032d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1443.622512] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:25 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0xd, &(0x7f0000004080)={@empty, @remote}, 0xc) [ 1443.662665] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1443.680559] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1443.688876] EXT4-fs (loop5): fragment/cluster size (4096) != block size (1024) 06:29:25 executing program 3: rseq(&(0x7f0000000000), 0x20, 0xa0000000, 0x0) [ 1443.716525] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1443.716602] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1443.853565] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1443.865866] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1443.871791] EXT4-fs (loop5): fragment/cluster size (4096) != block size (1024) [ 1443.873946] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x5, r0) 06:29:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000042d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000040000000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100064c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:25 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_SIOCRTMSG(r0, 0x400c744d, 0x0) [ 1444.214184] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1444.224690] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1444.236560] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x11, r0) [ 1444.263952] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1, &(0x7f0000000680)=@raw=[@func], &(0x7f00000006c0)='GPL\x00', 0x4, 0x8b, &(0x7f0000000700)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 1444.345920] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1444.356069] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1444.385669] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1444.396386] EXT4-fs (loop5): fragment/cluster size (4096) != block size (1024) 06:29:26 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_SIOCRTMSG(r0, 0x4004700e, 0x0) 06:29:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000052d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000010000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100074c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:26 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) [ 1444.621752] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1444.632095] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1444.662507] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1444.671908] EXT4-fs (loop5): fragment/cluster size (4096) != block size (2048) 06:29:26 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000080)="d8a2", 0x2, 0x20000854, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) [ 1444.771868] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1444.774707] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1444.778985] EXT4-fs (loop5): fragment/cluster size (4096) != block size (2048) [ 1444.810067] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1444.823930] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f02000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:26 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_SIOCRTMSG(r0, 0xc0045878, 0x0) 06:29:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000062d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1444.927987] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:26 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x40200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000040)=[{r1}, {r2}], 0x2, 0xffffffff) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000140)={0xd, 0x3}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ad93}], 0x1, 0x0) close(r0) 06:29:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100084c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1445.054810] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1445.080101] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1445.132594] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1445.139461] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1445.172927] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1445.179814] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1445.277613] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f03000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1445.317770] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1445.344703] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1445.394257] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000072d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1445.467710] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1445.497575] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100094c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/209, 0xd1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') preadv(r0, &(0x7f00000017c0), 0x103, 0x0, 0x0) [ 1445.704849] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1445.712241] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1445.726924] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1445.748851] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1445.753051] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1445.771900] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:27 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_SIOCRTMSG(r0, 0x8994, 0x0) 06:29:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f04000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1445.916844] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1445.937398] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:27 executing program 3: socket$inet(0x2, 0x3, 0x3) 06:29:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000092d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x8}, 0x40) [ 1446.132814] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1446.144407] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:27 executing program 3: [ 1446.291219] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1446.291272] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1446.305233] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1446.313187] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100224c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1446.346603] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:28 executing program 3: [ 1446.397704] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f05000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1446.502701] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1446.509667] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:28 executing program 3: 06:29:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000212d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:28 executing program 3: [ 1446.740646] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1446.750678] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:28 executing program 3: pipe(&(0x7f0000000580)={0xffffffffffffffff}) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, 0x0) 06:29:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100234c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1446.877127] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1446.893202] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1446.902743] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1446.909629] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1446.923829] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:28 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000004300)={0x0, 0x0, &(0x7f00000042c0)={0x0}}, 0x0) [ 1446.975241] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f06000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1447.034431] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1447.050259] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000222d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:28 executing program 3: 06:29:29 executing program 3: [ 1447.296047] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1447.310638] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430303101002c4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1447.411035] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1447.424554] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1447.442069] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1447.446362] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:29 executing program 3: [ 1447.485971] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1447.493520] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000232d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1447.586804] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1447.616960] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:29 executing program 3: 06:29:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f07000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:29 executing program 3: [ 1447.877223] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1447.894110] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100484c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:29 executing program 3: [ 1447.928352] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1447.936218] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1447.954369] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1447.982950] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:29 executing program 3: [ 1448.084634] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1448.098098] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1448.105225] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1448.113237] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300002c2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:30 executing program 3: 06:29:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f09000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:30 executing program 3: 06:29:30 executing program 3: 06:29:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430303101004c4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1448.502266] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1448.513608] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1448.526622] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1448.544034] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:30 executing program 3: [ 1448.588060] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1448.590916] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1448.722744] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1448.742262] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100684c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1448.772468] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1448.786750] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:30 executing program 3: 06:29:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000400000000300002d2d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f21000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:30 executing program 3: 06:29:30 executing program 3: [ 1449.141438] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1449.172856] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1449.179732] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:31 executing program 3: [ 1449.218856] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430303101006c4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:31 executing program 3: [ 1449.308873] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1449.324601] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:31 executing program 3: [ 1449.376147] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1449.385543] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1449.468036] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1449.477595] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000602d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:31 executing program 3: 06:29:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f22000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:31 executing program 3: [ 1449.643041] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1449.655546] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100744c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1449.725306] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1449.743327] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1449.765086] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1449.771695] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:31 executing program 3: [ 1449.805551] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1449.831868] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:31 executing program 3: 06:29:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000000410000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:31 executing program 3: [ 1449.959673] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1449.980291] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f23000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="02434430303101007a4c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:31 executing program 3: [ 1450.211390] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1450.226749] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1450.239731] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1450.250412] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1450.259681] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:32 executing program 3: [ 1450.289740] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1450.379981] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1450.392219] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1450.407958] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1450.422739] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:32 executing program 3: 06:29:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="024344303031010000250049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000004b0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f2c000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:32 executing program 3: 06:29:32 executing program 3: [ 1450.676520] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1450.707317] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:32 executing program 3: [ 1450.783103] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1450.784568] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0025004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1450.844900] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1450.847259] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:32 executing program 3: [ 1451.017472] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1451.030438] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1451.032636] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1451.052893] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1451.058375] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:32 executing program 3: [ 1451.064404] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000000a0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:32 executing program 3: 06:29:32 executing program 3: 06:29:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f2d000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0249004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:33 executing program 3: 06:29:33 executing program 3: [ 1451.390456] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1451.410803] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1451.532089] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1451.539357] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1451.552199] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1451.555360] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1451.559114] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:33 executing program 3: 06:29:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000000250000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0349004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1451.655451] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1451.679556] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1451.693243] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:33 executing program 3: 06:29:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f60000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:33 executing program 3: [ 1451.921884] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1451.928779] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:33 executing program 3: 06:29:33 executing program 3: [ 1452.055122] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1452.068698] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1452.089122] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1452.098479] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:33 executing program 3: 06:29:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0449004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1452.108384] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1452.128799] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="200000004000000003000000410000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1452.241065] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1452.270961] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:34 executing program 3: 06:29:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00030000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1452.380185] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1452.397540] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:34 executing program 3: [ 1452.530116] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1452.549714] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1452.563671] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1452.575470] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1452.605276] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1452.624452] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000004b0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:34 executing program 3: 06:29:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0549004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:34 executing program 3: 06:29:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:34 executing program 3: [ 1452.821722] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1452.839192] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f10040000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1452.930243] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1452.945607] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1452.957313] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:34 executing program 3: [ 1452.997351] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x12000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1453.084821] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1453.085064] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1453.107040] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1453.113899] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:34 executing program 3: 06:29:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000100000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:35 executing program 3: 06:29:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0649004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1453.315353] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1453.334666] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1453.337265] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:35 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) getpeername(r0, 0x0, 0x0) [ 1453.386253] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1453.397763] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1453.412074] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @remote, @remote}, 0xfffffffffffffd45) 06:29:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00050000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x12010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1453.563834] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1453.578488] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:35 executing program 3: setregid(0x0, 0xee00) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time_for_children\x00') 06:29:35 executing program 3: pipe2(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$char_usb(r0, 0x0, 0x0) 06:29:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000700000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1453.707831] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1453.715557] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1453.734216] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:35 executing program 3: [ 1453.757782] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0749004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x12020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:35 executing program 3: [ 1453.875454] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1453.885900] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1453.903644] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1453.916372] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00060000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:35 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) flock(r0, 0xc) [ 1454.080787] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1454.088498] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:35 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x6) [ 1454.152399] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1454.175371] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000900000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x12030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1454.207149] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1454.223422] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000240)=@un=@file={0x0, './file0\x00'}, 0x80) 06:29:36 executing program 3: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x0, 0x0) fchdir(r0) 06:29:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0849004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:36 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) sendmsg$inet(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @local}}}], 0x20}, 0x0) [ 1454.405273] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1454.414545] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1454.423758] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1454.433685] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00070000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1454.544193] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1454.573101] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1454.610098] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1454.624146] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1454.644409] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000000600)) 06:29:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x13000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1454.667501] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000a00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:36 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000ac0)=@ccm_128={{}, "b63ed37c05cf7a40", "eff10fdf11a2c7fde3e5bd6539defb2d", "66a58364", "d092dbb0bc271580"}, 0x28) 06:29:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0949004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00090000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1454.843111] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1454.850100] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:36 executing program 3: mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) [ 1454.926790] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1454.936551] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1454.951316] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:36 executing program 3: io_setup(0x57b, &(0x7f0000000000)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x4, &(0x7f00000017c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x81, r1, &(0x7f0000000040), 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0x0]) [ 1454.967818] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1454.977656] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1455.003612] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000b00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x13010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000a00), 0x4924924924924cf, 0x0) listen(r0, 0x0) 06:29:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c2249004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1455.253681] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1455.267445] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1455.288696] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1455.296199] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f04100000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1455.313894] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1455.314292] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x13020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1455.480394] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1455.500691] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1455.532238] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1455.539224] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c2349004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0200000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00200000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1455.828424] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1455.844292] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x13030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1455.918306] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1455.929911] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1455.936004] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1455.955562] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c2c49004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1456.075098] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1456.091245] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1456.100148] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1456.111028] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000002a00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=[@rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x18}], 0x1, 0x0) 06:29:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00210000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1456.245673] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0300000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x21, &(0x7f00000000c0)={@initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, 0xc) [ 1456.292899] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:38 executing program 3: socket$inet_icmp(0x2, 0x2, 0x1) select(0x40, &(0x7f00000012c0)={0x3}, 0x0, &(0x7f0000001240)={0x8}, 0x0) [ 1456.398935] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1456.411982] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1456.424400] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1456.432303] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:38 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x85f73f4a4c614029, 0x0) [ 1456.615540] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1456.638216] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1456.648542] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:38 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c4849004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:38 executing program 3: mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2012, 0xffffffffffffffff, 0x0) [ 1456.668677] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1456.676981] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1456.690819] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:38 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:29:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0400000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00220000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:38 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) [ 1456.958213] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1456.988947] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:38 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c4c49004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1457.027766] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1457.039221] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000005b00)={0x0, 0x0, 0x0}, 0x0) [ 1457.095302] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1457.125792] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1457.179201] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1457.179732] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1457.193966] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1457.244790] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:39 executing program 3: timer_create(0xadbfcdac3a458cc6, 0x0, 0x0) 06:29:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0500000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00230000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:39 executing program 3: openat$dir(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) 06:29:39 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c6849004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000240)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80) [ 1457.494337] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1457.520215] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1457.571318] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1457.580913] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1457.594764] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:39 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net\x00') [ 1457.626848] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:39 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) 06:29:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1457.706222] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1457.715982] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1457.724992] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1457.737761] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f002c0000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002c40)=[{&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000200)="e09a40cfcb44d28183b8844a678edc125ceadf5ca9d3042486ba89a78a8ef1fbda2cb839f3ad65053479c738916eec2de2b0050c92ef297156033848a96944a89c501c5ecd9034a2b038b7b04e26bd499fb7edf018896cdf33fbc4661dd5109e920d8e9a7cdf3f8e3dda6caa52dd9ba4d68e9f17886bffceda7a4c398cb12692d63a54a985e917abee890920f37beb57eae60574ee668cf95a2bccd75919ed6f7b61878de5a50017edc736abb4f6c6ec609ea823cc3c30227338bf234c2a0c1718b4f2f90de68031143d194b0a194884e7d0a01eec83f5", 0xd7}, {&(0x7f0000000300)="5827f4fbc6ac777b00ed7714b890357e0780f23cb1e4b676cf52ba2724ce21081f10cf015a6b6a1293d3d50f09b62047125084f752ef6d14dd02d17b4a57c6de8a5450ae201917ab13fee188f985a3c159ecb5bfdd9ebbef31a59af8e08ed7d4484d4809204cf73da162db490906d265bc9e9f9357f217d0fea0d9a3261c1be2d3cfedc0f3543005c65b0e", 0x8b}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="244c81d2b6eb554a51b393efa4912b0d41a1ffb5823f0c5b8fc7bc9b5d62ef6f563f34545c872f9ed5d6383527320671784e0946254df2fd62780a2c0b9b4b32b76c840414ef835c6c458045ebafb1f89d5075a5b723717663187f5adc0ea17665", 0xffffffffffffff60}, {&(0x7f0000000480)="08c7988dca107fe852ac8d51f048c14b19fa5740912583b8ce49b70bd1819cba476589fd870756004ad3b355584add323784ffdf3b2fe30aabfe51544529e5bce7a02ec81c866df00c7e489357f43ff1c89a3ded878642ca2705", 0x5a}], 0x5, 0x0, 0x0, 0x20000001}, {&(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000800), 0x0, &(0x7f0000000840)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xffffffffffffffff}}}], 0x40}, {&(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000900)="60e1f1184be84f5ddd4d2efc4eb25a6628fc62443a24bd185e2ccdfbeaef83fbba06595b6272", 0x26}], 0x1, &(0x7f0000000ac0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}, {&(0x7f0000000b00)=@abs, 0x6e, &(0x7f0000000c80)=[{&(0x7f0000000b80)="db0a6f44f16ef720fca463feeb939314f1bfd9eb1e8249aab0e648a42b0e196ecbe8166428be218078163af1e1b30f56092e193906f6af438ee00293c5ba18c37d88234ad8469a9dd0a192768e4e825d2e55c6f10e51f63dcef6a1edff8bb6c4f2e350569ec6174f034d617429133335fc96f56e186e54e49f944d12c5046eecf9cbb555373d4d0c16b27caacfeb055f47f812730c8b76c8a09ea28ed041e85cd64a5ce0709e155d18caee4d562325ceaf47930ecd08a19937", 0xb9}, {&(0x7f0000000c40)="4d282485c478107c59770d85a579d8dea5e0", 0x12}], 0x2, &(0x7f0000000d00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, {&(0x7f0000000d40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000dc0)="56befc09c433dad54477ed24195b2ec7c976dc205ff24243cce569799303378af629c80e764b9a10f7ae337a5b55801f46430e1fa732ad1eb7627db5d56682fb19b37215fc5dcbb70967999e0fde1aec843ac281e934c270de692fb30fc1bd3f21935e41fff740f0e2d44a647dd061aebe569b421662d85547ff17cf8655a4f09c6da8d2b958161ebe5b8b735997523fe0f2a29009ed9cd071ba6c6902c61a85a92afca6e1af947657ae9fbe1bdc669a9e754696c5593ae9b4f383348c87150a1ec40e555ce24a1b96e300378f61692585da38fdc276ba3a3d2dfc0f4eb9ab1b721149a94ae10a11a28d97f79e5307f3f8", 0xf1}, {&(0x7f0000000ec0)="05cac72a2b5b201494a5da725b62d1c988f9b0de9f822e3d2ea76cdd1a53204143e9f1f2337144e80e08df2981cfd03882d2e660e2d68d17f987cc258f42b9033a4889ae2f51d191272593448d71a04674928bf8b052eb5b1491bc412bf380f472bfa82d15c89686c0a0fea4b2c26dad553fee9e7a4eae202207e1b9e4849149d5920c31b0bcbf69e6c67b119507fac7512fd0a33e5d63408da8d51d07d75f8985c9af1f4dd795916908dbe01fe386674b22b11959940444b09d64ea273ba08bf4630cc2cb1e9fad0f111a34903f6246227b1d2ccd054922faa4d61858", 0xdd}, {&(0x7f0000000fc0)="68901847b28c5219a5e34509b9d3edfe013063b305f382334c9cc6c1ceeebc189550415209b500a483151ca8929a3dd31eee279d75883b91", 0x38}], 0x3, 0x0, 0x0, 0x20000000}, {&(0x7f0000001040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001180)=[{&(0x7f00000010c0)="7f25666e6a676fb56b44ee9e601c8e84a359ae7618f4c69f9adc2bb0b193f8dad51b8d1955b4501d1d29ae0bff732014253daeb1a7f555bff9f133df6d8c8313ff28fc45274c95eda403ecafe2ef67c71b8fe2cda09882ba84e3c841235992d8e3ac9307956fa304e0e3361abe66e5c255a326a1f9ff4e8806bb1238a70fa3eed079ec5be75180b986e676a46f84f4601be264709b0d929083884814066edd857d857d9f", 0xa4}], 0x1, &(0x7f00000024c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, {&(0x7f0000002500)=@abs, 0x6e, &(0x7f0000002700)=[{&(0x7f0000002580)="307f0e", 0x3}, {&(0x7f00000025c0)="0d4148254922905e5ad4314d535d3a3de74ec681b858c32d7db3f4010f42b2b5c87b012ad08e64675e35fe7f41c669d38177f705e0b6a7a74bb2b65076c1f21258261e1af2f596a0eddb92610e6fc287f25f8ff05d43c52b4c0747a48de0ecb8b6ea45d563184009512bd7911f6c998b838a702f00bbfc17dba6fb36d5623bacf86ee6e0715acf520fcf52a4cf89f5edab9c4aea36ba1a0b370e5876f9042305a478a16d859f1f76b8be011f", 0xac}, {&(0x7f0000002680)="a47576be4f241cc3f46f69c586a1be2ba9e8e7bebcdc4a5a37cab996b75bed189cfc6e588a892060fa08c06c2008fa49df3dd7a2b36d6898d80d94964c851fe7ecb50d4c971a6829d89db80b64cf30cd66a48769b0cdd88ecd28d2c46f57561a3651", 0x62}], 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000ff000000000100000002000000db75981d13eb974781af5b4d38966eb8a69782b5665ecaa9d169fc238ddf0a0d93d36f458bf11a7dc858615a53a1a1222141e2c909a379de4e200ccc9028a810ddc9c30ddcf7fe84b49c149843", @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x48, 0x5001}, {&(0x7f00000027c0)=@abs, 0x6e, &(0x7f0000002940)=[{&(0x7f0000002840)="4c1b997667b9b516c0e9b9809738a577d41e214d695d4a84a6fad7803cec318e6cda706bc1175449b5d6d975aeb2d6460b6b9b84048d86c9eb2135870c93ef9fbf2caa69f5cca847eb836fcc387b839e185260e45efbfa3ada1681f630cf7ec5f1a29be3b02a58a976293bc62f60f4a8d77c6d8ff7c70d9a9af6824efa78e22c73193e01296c7fac82f9a3f97729dbfdaf83f218b1fe4a757bdb562697cf9adcee78f16b977fc5cd56c78a5ca6d7c708d8ea4b920c16664b1f1ca75f7840fb364a5ffdfc8907edef3add61b57e8f98796c1eddf52ce4b985fd736f17920cf67d0bdf8b580e88d9d76d1a6a03b86b053c0e5f7f96e249af", 0xf7}], 0x1, &(0x7f0000001240)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}], 0x8, 0x0) 06:29:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0600000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:39 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) sendmsg$inet(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}, 0x0) 06:29:39 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c6c49004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:39 executing program 3: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000080)={{0x0, 0xee00, 0x0, 0xee01, 0xee01}}) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x0) [ 1458.098085] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1458.129774] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1458.141678] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000a00), 0x4924924924924cf, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, 0x0, 0x0) [ 1458.160736] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1458.164088] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1458.174921] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0700000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c7449004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x15000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1458.289451] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1458.300457] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1458.346541] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1458.353989] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0800000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f002d0000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1458.445441] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x15010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1458.503779] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c7a49004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1458.636148] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1458.644639] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1458.654143] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1458.660638] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1458.676318] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1458.698450] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x15020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1458.766668] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1458.773962] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1458.778401] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1458.796940] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f003f0000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0900000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0025004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000480)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) [ 1459.011366] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1459.045525] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1459.072634] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1459.097143] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00400000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1459.136507] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1459.145455] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x15030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:40 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 06:29:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0c00000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1459.330024] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1459.350898] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:41 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000040)=""/62) [ 1459.456774] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1459.474742] EXT4-fs: failed to create workqueue [ 1459.492594] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1459.499745] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1459.510498] EXT4-fs (loop1): mount failed 06:29:41 executing program 3: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001080)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f40)=[{{0x0, 0x0, &(0x7f0000000c00)=[{0x0}, {&(0x7f00000007c0)=""/245, 0xf5}, {&(0x7f00000008c0)=""/29, 0x1d}], 0x3}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000a00), 0x4924924924924cf, 0x0) 06:29:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x16000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1459.623365] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1459.632963] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c004900250055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00600000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:41 executing program 3: select(0x40, &(0x7f00000000c0)={0x6}, 0x0, 0x0, &(0x7f00000001c0)) [ 1459.800001] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1459.809895] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1459.823473] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1459.841595] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1459.842727] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1459.877490] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d2100000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:41 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, 0x0, 0x82) [ 1460.051432] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1460.058440] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x16010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049024e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000fc0ed0000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:41 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x22e102, 0x0) [ 1460.263927] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1460.306064] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:42 executing program 3: pipe(&(0x7f0000000040)) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) [ 1460.406635] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1460.416236] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1460.491857] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1460.516389] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) [ 1460.541453] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1460.564945] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1460.578983] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1460.590325] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049034e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0fff0000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d2200000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000000c0)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 06:29:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x16020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:42 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40901, 0x0) write$cgroup_int(r0, 0x0, 0x0) [ 1461.030582] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1461.047436] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1461.055518] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1461.065219] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1461.076579] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049044e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:42 executing program 3: pipe2(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$char_usb(r0, &(0x7f0000001140)="c2", 0x1) [ 1461.128897] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x16030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1461.274346] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1461.283721] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:43 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, 0x0) 06:29:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000400000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1461.390543] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1461.397560] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') 06:29:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d2300000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1461.585076] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1461.585279] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1461.623139] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_script(r0, 0x0, 0xffffffffffffff7e) [ 1461.652755] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049054e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000fffff1f00000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x17000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002c40)=[{&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, {0x0, 0x0, &(0x7f0000000800)}], 0x2, 0x0) [ 1461.833902] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1461.850242] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000000c0)={@multicast1, @dev}, 0xc) [ 1461.962401] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1461.977375] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1461.984533] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1461.995453] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1462.057772] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1462.082099] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000001000)=[{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)='l', 0x1}], 0x1, &(0x7f0000000900)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}], 0x1, 0x0) [ 1462.110792] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049064e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d2c00000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x17010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:43 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@private2, @in=@broadcast}}, {{@in6=@private2}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xffffff65) [ 1462.164206] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:44 executing program 3: futimesat(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x0) 06:29:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f6b6b6b00000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1462.321278] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1462.339485] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:44 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f00000000c0)={{0x3, 0x0, 0xffffffffffffffff, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) [ 1462.451804] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1462.485993] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1462.518729] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1462.536734] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:44 executing program 3: r0 = socket(0x1, 0x80003, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80) 06:29:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049074e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d2d00000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x17020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1462.631225] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1462.657118] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1462.765779] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1462.777354] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1462.781763] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1462.805318] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1462.936183] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1462.965654] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000001000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049084e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1462.990222] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1462.990449] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d6000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x17030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1463.127482] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1463.152529] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1463.292299] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1463.306164] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1463.318681] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1463.328356] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1463.476595] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1463.491531] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000002000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000800)={'vxcan1\x00'}) pipe(&(0x7f0000000480)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, 0x0, 0x0) geteuid() setsockopt$inet_tcp_buf(r3, 0x6, 0x1f, &(0x7f0000000040), 0x0) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) sendto(r0, 0x0, 0x0, 0x8c1, &(0x7f0000001580)=@in={0x2, 0x0, @dev}, 0x80) [ 1463.517233] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1463.532179] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:45 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049094e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0003000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:45 executing program 3: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x5}, 0x0, &(0x7f0000000100)={0x0, r0/1000+10000}) 06:29:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1463.691697] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1463.701017] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:45 executing program 3: socket$inet_icmp(0x2, 0x2, 0x1) select(0x40, &(0x7f00000012c0), &(0x7f0000001140)={0x3}, 0x0, 0x0) [ 1463.809266] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1463.818302] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1463.828635] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1463.844930] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000003000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1464.000554] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1464.036986] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:45 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049224e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:45 executing program 3: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) select(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x81}, &(0x7f0000000180)={0x0, r0/1000+60000}) [ 1464.061323] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1464.097423] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1464.133148] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1464.158190] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d1004000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) [ 1464.348094] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1464.362926] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:46 executing program 3: open(0x0, 0x0, 0x0) 06:29:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000004000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1464.461705] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1464.480820] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049234e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:46 executing program 3: socket$inet6(0x18, 0x0, 0x9) [ 1464.611162] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1464.650696] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:46 executing program 3: getpriority(0x0, 0x0) getpriority(0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) [ 1464.675481] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1464.690874] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1464.709442] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1464.716748] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:46 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) 06:29:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0005000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1464.880038] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1464.887715] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1464.918773] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000005000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:46 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) [ 1464.970381] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1465.040084] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1465.047001] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:46 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000440)="2668b21cb015b6a1c273b019b252472e3d4faeffd5a2c2e3a01fc176ef4d6e49bdacbd036326560eb038c223e77d5639d30cfb1ed4ba0d05103f126be92d0a62", 0x40) 06:29:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c00492c4e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1465.158686] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1465.182637] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1465.183705] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:47 executing program 3: [ 1465.212252] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0006000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1465.349313] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1465.382229] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1465.389094] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:47 executing program 3: 06:29:47 executing program 3: [ 1465.404556] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000006000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049484e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:47 executing program 3: [ 1465.581787] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1465.593058] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x19000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0007000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:47 executing program 3: 06:29:47 executing program 3: 06:29:47 executing program 3: [ 1465.770629] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1465.777677] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1465.792465] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1465.800063] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:47 executing program 3: [ 1465.935889] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1465.967524] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:47 executing program 3: 06:29:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c00494c4e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1465.977204] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1465.995541] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1466.010024] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x19010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1466.041052] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000007000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:47 executing program 3: 06:29:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0009000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:48 executing program 3: 06:29:48 executing program 3: [ 1466.353195] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1466.396338] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1466.410432] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1466.431386] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049684e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1466.453127] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1466.476927] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x19020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:48 executing program 3: [ 1466.498581] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1466.512803] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d000c000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:48 executing program 3: [ 1466.616226] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1466.650799] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000009000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:48 executing program 3: [ 1466.807055] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1466.841409] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:48 executing program 3: [ 1466.853173] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1466.862483] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c00496c4e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x19030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1466.969728] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1466.996084] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:48 executing program 3: [ 1467.041124] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1467.050031] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0410000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000410000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1467.177073] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1467.177243] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1467.191248] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:49 executing program 3: [ 1467.266067] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1467.328297] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1467.338603] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1467.353657] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1467.366475] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1a000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049744e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:49 executing program 3: [ 1467.573822] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1467.585406] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1467.593267] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1467.604037] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:49 executing program 3: [ 1467.614744] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1467.625294] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000020000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d001f000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:49 executing program 3: 06:29:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1a010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1467.889678] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1467.915956] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:49 executing program 3: [ 1467.981861] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1467.997669] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c00497a4e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:49 executing program 3: [ 1468.085316] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1468.092563] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1468.116956] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0020000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1468.156880] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000021000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1a020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:50 executing program 3: 06:29:50 executing program 3: [ 1468.386137] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1468.393846] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1468.425682] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:50 executing program 3: 06:29:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c004900250055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1468.437676] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1468.535937] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1468.552797] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1468.562917] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:50 executing program 3: [ 1468.586314] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1468.594247] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0021000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:50 executing program 3: [ 1468.635877] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000022000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:50 executing program 3: 06:29:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1a030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:50 executing program 3: 06:29:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0025005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1468.957882] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1468.967715] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1468.978990] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1468.987228] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:50 executing program 3: [ 1469.005199] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1469.035470] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1469.110369] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1469.120007] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1469.148301] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1b000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1469.160731] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000023000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:50 executing program 3: 06:29:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0022000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:51 executing program 3: [ 1469.407469] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1469.429895] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1469.562592] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:51 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0255005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1b010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:51 executing program 3: [ 1469.602832] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1469.611053] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1469.627225] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:51 executing program 3: 06:29:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0023000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1469.801555] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1469.814400] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:51 executing program 3: 06:29:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000002c000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1469.935655] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:51 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0355005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1469.978690] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1b020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:52 executing program 3: [ 1470.422403] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1470.444081] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1470.464493] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1470.495253] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1470.501724] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1470.517790] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:52 executing program 3: 06:29:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1b030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:52 executing program 3: [ 1470.666286] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1470.673435] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1470.683030] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1470.685000] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000002d000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0455005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d002c000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:52 executing program 3: [ 1470.977588] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1470.984548] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1471.008841] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1471.025382] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:52 executing program 3: [ 1471.081618] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1471.098187] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:52 executing program 3: [ 1471.177447] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1471.188090] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:53 executing program 3: chown(&(0x7f0000000080)='.\x00', 0x0, 0x0) 06:29:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000003f000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0555005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1471.280432] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1471.309899] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:53 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x2}, 0xffffffffffffff42) [ 1471.477611] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1471.493654] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d002d000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1471.533122] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1471.553339] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x47, &(0x7f0000000040)={@rand_addr, @multicast1, @remote={0xac, 0x14, 0x0}}, 0xc) 06:29:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1471.622380] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1471.649391] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:53 executing program 3: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x2010, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) [ 1471.686614] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1471.695598] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000040000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:53 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)=@file={0xa}, 0xa, &(0x7f0000000380)=[{&(0x7f0000000140)="7afe24b03e26d7812a1ab48974e45129a5b6b15271ca72a2f405f02523a6f64f5a55a607e8fa00a330dc0d104d102552daf8898ce8d4701a76a6787971c7f53f13bf5f3299bb868fa8a8d8c80d2d2faab702566bcc403856a3ce906285d976f7a64f3634d828f3342539f33416567a73fda32f7a4342c021886ea24db5746ab3ab767ab170a2a16a8c91c25a306b650be4a2", 0x92}, {&(0x7f0000000200)="86807b24e3e584bb069894a965ecdf996da247330951f1af628460a9", 0x1c}, {&(0x7f0000000300)="6efe79424abfdf0448a4d03645b1e9a9ececc032fbc46341496aabc342509573cce2b6cb9df11e3ac55fc10b91fa063090478bb8a0383bba590c5b29b4c25ceed2d6a4752980384c2a6e03d447f71291f91afdc288dfc55b0ceac527835bb0d806", 0x61}, {&(0x7f00000004c0)="d8b6bdb0539c3f6add8c56c49365a45dd9b86ad7760bd7bc8c0eb5ddcf87d99d9ebbd19783e8fb1be4ff0909e9e41c1c3348ee57264100fcf09f6b8bd7f982062089", 0x42}], 0x4, &(0x7f00000003c0)=[@rights, @rights, @rights, @rights, @cred], 0x74}, 0x0) 06:29:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0655005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1471.897129] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1471.913693] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1471.925522] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1471.946919] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000080)="95180fcb67c17d4da64209636b2b5f1b727e963a43f07cdea3d1ef85781d5edab7cf61bf5ccd178886cbad01f61735f35d8675ca5347f4b547cf653e787a7ee4e5a16e2954bf7f510c37be22752f9080db909fb5aec245ab7794affbe1b75b59943f6719f3d8264e11e691df04ef9b4b57aa15a0325ec8dec543dfefefed066515c96610fbf02b", 0x87, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 06:29:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d003f000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1472.059747] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1472.080435] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:53 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x19, &(0x7f00000000c0), 0x0) [ 1472.209363] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1472.216687] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1472.223630] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1472.238481] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1472.250978] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1472.253410] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 06:29:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000060000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1472.425010] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1472.437863] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:54 executing program 3: syz_emit_ethernet(0x176, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6000000301c3c3f73a85ab1d183449164b2a400000fe8000000000000000000000000000bb"], 0x0) 06:29:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0040000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:54 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) poll(&(0x7f0000001040)=[{r0, 0x44}], 0x1, 0x0) 06:29:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0755005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1472.795711] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1472.815283] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:54 executing program 3: utimensat(0xffffffffffffffff, 0x0, 0x0, 0x2f81693af47e6e95) 06:29:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1d000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1472.850393] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1472.858628] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1472.864153] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1472.887998] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:54 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x19, 0x0, 0x0) [ 1473.040977] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1473.047856] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1473.054417] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1473.068082] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000004c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 06:29:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f006b6b6b000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0060000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000014c0)={0xffffffffffffffff}) r1 = perf_event_open$cgroup(&(0x7f0000002bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) [ 1473.223315] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0855005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f00000004c0)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 1473.272693] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1473.284808] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1473.292122] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1d010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:55 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000240)={0x10, 0x2}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) [ 1473.381378] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1473.392977] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1473.401085] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1473.408229] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0fff000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1473.600893] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1473.622141] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:55 executing program 3: syz_emit_ethernet(0xa7, &(0x7f00000000c0)={@local, @broadcast, @val, {@ipv6}}, 0x0) [ 1473.735463] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1473.759758] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000fffffff8c000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1473.792009] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1473.804275] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:55 executing program 3: open$dir(&(0x7f0000019180)='./file0\x00', 0x114ca5b34ec67574, 0x0) 06:29:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0955005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1d020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1473.953138] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1473.963528] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1473.977659] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1474.004184] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x1000000}]}}, &(0x7f00000004c0)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 06:29:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000001000000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1474.163576] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1474.208006] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1474.241383] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1474.259099] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1474.268587] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:56 executing program 3: r0 = perf_event_open(&(0x7f0000003b80)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000003b80)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7) 06:29:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1d030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e2255005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1474.305309] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000edc0000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x2001) [ 1474.487989] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1474.515498] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000002100000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000002a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x40049409, 0x0) 06:29:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e2355005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1474.620884] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1474.638658] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1474.655279] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1474.705171] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1474.754249] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1474.777010] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1474.788381] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:56 executing program 3: r0 = perf_event_open(&(0x7f0000003b80)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000003b80)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) close(r0) [ 1474.806872] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1e000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x1e, 0x2, &(0x7f00000001c0)=@raw=[@initr0], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:29:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000ffffffff5000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1474.997543] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1475.006862] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:56 executing program 3: 06:29:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000002d00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e2c55005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1475.196712] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1475.219804] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1475.235880] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:57 executing program 3: [ 1475.260488] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1475.272110] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1475.309039] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1475.346431] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:57 executing program 3: [ 1475.367134] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1e010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000ffffffff6000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1475.440402] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1475.447484] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:57 executing program 3: 06:29:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000004100000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:57 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e4855005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:57 executing program 3: [ 1475.714213] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1475.716963] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1475.729589] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1475.745321] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:29:57 executing program 3: [ 1475.766824] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1475.804504] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1e020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1475.837583] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1475.860569] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:57 executing program 3: 06:29:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000ffffffffe000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1475.907693] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1475.923637] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000004b00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:57 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e4c55005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:57 executing program 3: [ 1476.137921] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1476.147169] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1476.168265] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:29:58 executing program 3: [ 1476.201038] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1476.206145] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1476.222665] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000fff000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1476.295925] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1476.314392] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:58 executing program 3: 06:29:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1e030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1476.408411] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1476.423637] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:58 executing program 3: 06:29:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e6855005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:58 executing program 3: [ 1476.615655] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1476.626773] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0002000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:58 executing program 3: 06:29:58 executing program 3: [ 1476.847234] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1476.867444] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1476.888375] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:58 executing program 3: 06:29:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e6c55005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:58 executing program 3: [ 1476.914635] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1476.941109] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1476.947987] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f001fffff000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1477.042087] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1477.052376] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:58 executing program 3: 06:29:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0003000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1477.187010] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1477.206986] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:59 executing program 3: [ 1477.294104] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1477.339921] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1477.361995] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1477.368852] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1477.377789] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:29:59 executing program 3: [ 1477.388038] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e7455005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:29:59 executing program 3: 06:29:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f8cffffff000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1f010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1477.567451] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1477.595221] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:59 executing program 3: 06:29:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0004000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:59 executing program 3: [ 1477.733751] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1477.744808] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1477.848899] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1477.880549] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1477.887620] EXT4-fs (loop5): Can't read superblock on 2nd try 06:29:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e7a55005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1477.928104] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:29:59 executing program 3: 06:29:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000ff5ffffff000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:29:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1f020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1478.028990] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1478.063593] EXT4-fs (loop4): Can't read superblock on 2nd try 06:29:59 executing program 3: 06:29:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5, 0x40002) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "1f277fed7d0a6d618d43c8844a453f255372d951e49e44db2a8add89ad600c704bf007b82719def8e52eb32bc54081d3df0b4cd534efdaacfa1e3c9b4abd4cb5", "461ed3b0abdc5fb2ee2787ac109e2cbb1f5e9b9c02cc4925620ba8c845b90254"}) [ 1478.231705] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1478.248454] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1478.260815] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1478.263638] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1478.360450] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1478.379389] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0005000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5, 0x40002) fallocate(r0, 0x3, 0x0, 0x10000) 06:30:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0025005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1f030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000ff6ffffff000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3814, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4080, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:30:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0006000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1478.736525] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1478.780703] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1478.827134] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1478.861694] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:00 executing program 3: unshare(0x64040600) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5, 0x40002) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x101) [ 1478.873283] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1478.882967] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0007000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1478.957955] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1478.969684] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1478.988922] IPVS: ftp: loaded support on port[0] = 21 06:30:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000ffeffffff000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055025800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1479.185911] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1479.205523] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1479.213210] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:01 executing program 3: [ 1479.250939] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1479.323776] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1479.348215] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:01 executing program 3: [ 1479.376086] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1479.397572] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0008000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:01 executing program 3: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4829, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x101}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1479.491800] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1479.512534] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055035800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000030000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:01 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000007dc0)={'dummy0\x00', @ifru_flags}) [ 1479.633319] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1479.646447] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1479.663606] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1479.699887] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:01 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000780)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x4b49, 0x0) 06:30:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0009000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000007dc0)={'ip6_vti0\x00', @ifru_flags}) [ 1479.862458] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1479.887189] EXT4-fs (loop5): bad block size 8192 06:30:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000040000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)=@ipv4_newroute={0x3c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_DST={0x14, 0x2, @private0}}, @RTA_UID={0x8, 0xf, 0xee01}]}, 0x3c}}, 0x0) [ 1480.048232] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1480.053750] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1480.079875] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000001000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef020001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2e200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000008082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000340)) [ 1480.097273] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055045800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d000c000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1480.205284] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1480.223416] EXT4-fs (loop5): bad block size 16384 [ 1480.269652] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1480.282300] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1480.301748] EXT4-fs (loop3): cluster size (2048) smaller than block size (4096) [ 1480.435065] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1480.448100] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1480.457859] EXT4-fs (loop5): bad block size 16384 [ 1480.471304] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:30:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000070000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1480.484697] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1480.492718] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0021000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1480.575479] EXT4-fs (loop3): cluster size (2048) smaller than block size (4096) 06:30:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055055800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x21000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xfffffffffffffd8d, &(0x7f0000000180)={&(0x7f0000000240)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x34}}, 0x0) [ 1480.862534] EXT4-fs (loop5): Unsupported filesystem blocksize 131072 (7 log_block_size) [ 1480.892725] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:30:02 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174600404090a0207027400f8", 0xfffffffffffffff3}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x8010, &(0x7f00000001c0)=ANY=[]) [ 1480.923708] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1480.992925] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1481.011114] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0022000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1481.038491] EXT4-fs (loop5): Unsupported filesystem blocksize 131072 (7 log_block_size) 06:30:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x21010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055065800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f000000000000000f0000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1481.242753] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1481.267852] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0023000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1481.362996] EXT4-fs (loop5): Unsupported filesystem blocksize 33554432 (15 log_block_size) 06:30:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055075800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000100000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1481.502505] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1481.520260] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x21020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1481.570355] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1481.594324] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1481.670347] EXT4-fs (loop5): Unsupported filesystem blocksize 67108864 (16 log_block_size) 06:30:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055085800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1481.774241] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1481.794298] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)=@ipv4_newroute={0x1c, 0x15, 0x1}, 0x1c}}, 0x0) [ 1481.824999] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1481.863609] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1481.902739] EXT4-fs (loop5): Unsupported filesystem blocksize 67108864 (16 log_block_size) 06:30:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x21030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d002c000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000140000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1481.972214] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 06:30:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5, 0x40002) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f0000000080)={0xc00, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "1f277fed7d0a6d618d43c8844a453f255372d951e49e44db2a8add89ad600c704bf007b82719def8e52eb32bc54081d3df0b4cd534efdaacfa1e3c9b4abd4cb5", "461ed3b0abdc5fb2ee2787ac109e2cbb1f5e9b9c02cc4925620ba8c845b90254"}) 06:30:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055095800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:04 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 1482.240605] EXT4-fs (loop5): Unsupported filesystem blocksize 1073741824 (20 log_block_size) [ 1482.245543] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1482.257055] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1482.279616] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f000000000000001f0000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1482.303953] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1482.371310] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1482.389462] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x22000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d002d000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:04 executing program 3: r0 = inotify_init1(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) [ 1482.464051] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (31 log_block_size) [ 1482.630522] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (31 log_block_size) 06:30:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000210000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1482.713772] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1482.727872] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1482.747474] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:30:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055225800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1482.789721] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1482.798471] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1482.821939] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1482.900491] ================================================================================ [ 1482.909541] UBSAN: Undefined behaviour in fs/ext4/super.c:3763:25 [ 1482.915815] shift exponent 33 is too large for 32-bit type 'int' [ 1482.921965] CPU: 1 PID: 24243 Comm: syz-executor.5 Not tainted 4.19.152-syzkaller #0 [ 1482.929841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1482.929851] Call Trace: [ 1482.929892] dump_stack+0x22c/0x33e [ 1482.929917] ubsan_epilogue+0xe/0x3a 06:30:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0060000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1482.929934] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 1482.930022] ? btrfs_cross_ref_exist+0x133/0x200 [ 1482.930050] ext4_fill_super.cold+0x33b/0x4ea [ 1482.964642] ? vsnprintf+0x2cc/0x14f0 [ 1482.968458] ? pointer+0x850/0x850 [ 1482.972022] ? lock_downgrade+0x750/0x750 [ 1482.976176] ? ext4_calculate_overhead+0x12f0/0x12f0 [ 1482.981295] ? snprintf+0xbb/0xf0 [ 1482.984759] ? vsprintf+0x30/0x30 [ 1482.988223] ? __mutex_add_waiter+0x160/0x160 [ 1482.992722] ? set_blocksize+0x163/0x3f0 [ 1482.996814] mount_bdev+0x2fc/0x3b0 [ 1483.000452] ? ext4_calculate_overhead+0x12f0/0x12f0 [ 1483.005653] mount_fs+0xa3/0x318 [ 1483.009031] vfs_kern_mount.part.0+0x68/0x470 [ 1483.013533] do_mount+0x51c/0x2f10 [ 1483.017078] ? do_raw_spin_unlock+0x171/0x240 [ 1483.021576] ? check_preemption_disabled+0x41/0x2b0 [ 1483.026596] ? copy_mount_string+0x40/0x40 [ 1483.030846] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 1483.035693] ? copy_mount_options+0x261/0x370 [ 1483.040178] ksys_mount+0xcf/0x130 [ 1483.043704] __x64_sys_mount+0xba/0x150 [ 1483.047662] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 1483.052239] do_syscall_64+0xf9/0x670 [ 1483.056028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1483.061198] RIP: 0033:0x4608aa [ 1483.064373] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1483.083269] RSP: 002b:00007faa2437ea88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1483.090974] RAX: ffffffffffffffda RBX: 00007faa2437eb20 RCX: 00000000004608aa [ 1483.098223] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faa2437eae0 [ 1483.105474] RBP: 00007faa2437eae0 R08: 00007faa2437eb20 R09: 0000000020000040 [ 1483.112726] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000040 [ 1483.119983] R13: 0000000020000100 R14: 0000000020000080 R15: 0000000020000140 [ 1483.127333] ================================================================================ [ 1483.140207] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1483.150964] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1483.154762] EXT4-fs (loop5): Invalid log block size: 33 06:30:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x22010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055235800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f000000000000002d0000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1483.275130] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:05 executing program 3: [ 1483.383019] EXT4-fs (loop5): Unsupported filesystem blocksize 8388608 (45 log_block_size) [ 1483.397740] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1483.405128] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:30:05 executing program 3: [ 1483.423874] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1483.451747] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1483.477234] EXT4-fs (loop5): Unsupported filesystem blocksize 8388608 (45 log_block_size) 06:30:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x22020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000030f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:05 executing program 3: 06:30:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f000000000000003f0000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:05 executing program 3: [ 1483.787062] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1483.800689] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1483.843262] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1483.857845] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x22030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00552c5800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0010040f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1483.913869] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (63 log_block_size) 06:30:05 executing program 3: [ 1484.038694] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (63 log_block_size) [ 1484.057118] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1484.085471] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:05 executing program 3: 06:30:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000400000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1484.156220] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:30:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1484.199734] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:06 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) 06:30:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055485800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1484.379972] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1484.380299] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1484.406915] EXT4-fs (loop5): Invalid log block size: 64 [ 1484.413984] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:30:06 executing program 3: r0 = socket(0x2, 0x3, 0x6) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000011) [ 1484.426713] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1484.443056] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000050f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x23010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1484.568064] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1484.586401] EXT4-fs (loop5): Invalid log block size: 64 06:30:06 executing program 3: socket(0x1, 0x1, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000140)={0x8}, 0x0, 0x0, 0x0) 06:30:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000ffffffff0000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:06 executing program 3: r0 = socket(0x1, 0x1, 0x0) sendto$packet(r0, 0x0, 0x0, 0x4004001, 0x0, 0x0) [ 1484.814136] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1484.824726] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1484.849717] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:30:06 executing program 3: r0 = socket(0x2, 0x1, 0x0) sendto$packet(r0, &(0x7f0000000000)='U', 0x1, 0x4004001, 0x0, 0x0) [ 1484.893090] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000060f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1484.949493] EXT4-fs (loop5): Unsupported filesystem blocksize 0 (255 log_block_size) 06:30:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00554c5800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000010000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x23020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:06 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000140)={'filter\x00', 0x7, 0x4, 0x3fc, 0x0, 0x218, 0x0, 0x31c, 0x31c, 0x31c, 0x4, 0x0, {[{{@arp={@multicast1, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_bond\x00', 'bond_slave_0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @dev, @multicast2}}}, {{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="607a8f0b5f23", @loopback, @multicast1}}}, {{@uncond, 0xbc, 0x104}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x448) [ 1485.158311] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1485.170224] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1485.188555] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1485.195667] EXT4-fs (loop5): fragment/cluster size (4096) != block size (2048) [ 1485.198466] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:30:07 executing program 3: r0 = socket(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, 0x0, 0x0) [ 1485.237882] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x23030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x80, 0x4) 06:30:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055685800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1485.433177] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1485.449226] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1485.466444] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1485.471821] EXT4-fs (loop5): fragment/cluster size (4096) != block size (2048) 06:30:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000070f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:07 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000000)={0x14eb, {{0x2, 0x0, @multicast1}}}, 0xffffffffffffffed) 06:30:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00020000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:07 executing program 3: syz_genetlink_get_family_id$netlbl_mgmt(0x0) syz_genetlink_get_family_id$ethtool(0x0) [ 1485.665279] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1485.681622] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1485.701708] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:07 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000540)={&(0x7f0000000080), 0xc, &(0x7f0000000500)={0x0}}, 0x0) [ 1485.744352] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:07 executing program 3: r0 = socket(0x1, 0x1, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x5c}}, 0x801) [ 1485.822787] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1485.832430] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00556c5800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000090f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:07 executing program 3: r0 = socket(0xa, 0x3, 0x5) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={0x0}}, 0x0) [ 1485.934381] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1485.945796] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00030000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1486.058840] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1486.072493] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:07 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000100)) [ 1486.163182] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1486.200129] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d00000c0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055745800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1486.210413] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1486.217256] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:08 executing program 3: eventfd(0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000140)={0x8}, 0x0, 0x0, 0x0) 06:30:08 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x0, @random="162f24f38164"}, 0x2e, {0x2, 0x0, @broadcast}, 'syzkaller0\x00'}) [ 1486.442056] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1486.462573] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00040000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) [ 1486.552164] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1486.561467] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1486.577193] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1486.584911] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1486.681335] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1486.700156] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00557a5800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:08 executing program 3: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, @multicast}, 0x48, {0x2, 0x0, @dev}, 'bridge_slave_0\x00'}) [ 1486.749909] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1486.772397] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0004100f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1486.894210] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1486.910327] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1486.934783] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1486.943026] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:08 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000001c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:30:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00050000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1487.036265] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1487.068620] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005827020020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) [ 1487.281470] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1487.293220] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1487.306017] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1487.324203] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:09 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x8003}, 0x4) 06:30:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d00001f0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1487.380641] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1487.400457] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1487.530414] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1487.545428] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800090020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:09 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1d) getsockname$packet(r0, 0x0, &(0x7f0000000100)) [ 1487.573346] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1487.587879] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00060000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1487.779355] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1487.808514] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:30:09 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0xffffffffffffffed) [ 1487.833185] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1487.854408] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000200f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1487.973939] EXT4-fs (loop5): Test dummy encryption mount option ignored 06:30:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, 0x0) 06:30:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e00550058000a0020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1488.020812] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:10 executing program 3: [ 1488.296929] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1488.304457] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1488.316181] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1488.331002] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:10 executing program 3: 06:30:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00070000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000210f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1488.472886] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1488.518523] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:10 executing program 3: [ 1488.586000] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1488.604246] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:10 executing program 3: [ 1488.638510] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1488.665767] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005802200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000220f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1488.791576] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1488.800284] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1488.812946] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:10 executing program 3: [ 1488.849782] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00090000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:10 executing program 3: [ 1489.136154] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1489.150745] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1489.157599] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1489.165387] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:10 executing program 3: 06:30:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005803200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1489.320375] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1489.337864] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1489.356731] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1489.363785] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:11 executing program 3: 06:30:11 executing program 3: [ 1489.382873] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1489.405232] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00210000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000230f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:11 executing program 3: 06:30:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005804200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:11 executing program 3: [ 1489.832416] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1489.839593] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1489.851218] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1489.857658] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1489.868377] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:30:11 executing program 3: [ 1489.894101] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:11 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, 0x0) [ 1489.997793] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1490.013521] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1490.021570] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1490.028477] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d00002c0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00220000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1490.153812] EXT4-fs (loop1): Test dummy encryption mount option ignored 06:30:12 executing program 3: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) [ 1490.198557] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005805200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1490.350681] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1490.363495] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:12 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) [ 1490.464683] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1490.472494] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1490.498211] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1490.509218] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1490.535377] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1490.566733] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00230000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x26030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x7, 0x0, 0xe7, 0x669d}, {0x0, 0x0, 0x5, 0x4}, {0x3, 0x0, 0x0, 0x1}, {0x6}]}) 06:30:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005806200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1490.855416] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1490.884343] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1490.950344] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1490.957959] audit: type=1326 audit(1603002612.702:61): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24851 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0x0 [ 1490.981320] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d00002d0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1491.070794] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1491.091742] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x27000000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1491.162640] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1491.186743] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f002c0000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005807200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1491.286679] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1491.304126] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1491.479819] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1491.500498] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1491.506146] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x27010000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1491.535251] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1491.618406] audit: type=1326 audit(1603002613.362:62): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24851 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0x0 06:30:13 executing program 3: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x183482) 06:30:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005808200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) 06:30:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d00003f0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1491.701881] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1491.725321] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:13 executing program 3: syz_open_dev$video(&(0x7f0000000580)='/dev/video#\x00', 0xffffffffffffffff, 0x0) [ 1491.867743] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1491.876723] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1491.887289] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1491.905878] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1491.917780] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue [ 1491.934073] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:13 executing program 3: syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') 06:30:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f002d0000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000400f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x27020000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005809200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1492.172989] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1492.184983] EXT4-fs (loop4): Test dummy encryption mount option ignored 06:30:14 executing program 3: setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000040)="202de4ff2b189993d96085995396fa28abf8105c4a84f4c0d810912d", 0xfffffffffffffed3) [ 1492.216597] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1492.237489] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1492.383563] EXT4-fs (loop1): Test dummy encryption mount option ignored [ 1492.393651] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1492.410274] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1492.419004] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1492.424181] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:14 executing program 3: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/timer\x00', 0xc4901) 06:30:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005822200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='hide,unhide,iocharset=c']) [ 1492.456652] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue 06:30:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000600f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00600000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x27030000, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 06:30:14 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000001700)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000001c0)={0x0, 0x1, &(0x7f0000000140)='N'}) [ 1492.732823] EXT4-fs (loop4): Test dummy encryption mount option ignored [ 1492.741872] EXT4-fs (loop4): Can't read superblock on 2nd try 06:30:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="2000000040000000030000002d000fff0f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 1492.782341] EXT4-fs (loop5): Test dummy encryption mount option ignored [ 1492.812002] EXT4-fs (loop5): Can't read superblock on 2nd try 06:30:14 executing program 3: select(0x40, &(0x7f0000001500), 0x0, &(0x7f0000001580)={0x10000}, &(0x7f00000015c0)={0x0, 0xea60})