347] EXT4-fs (loop5): Invalid log cluster size: 7424 [ 2826.447852][ T1351] loop4: detected capacity change from 0 to 1062 [ 2826.462217][ T1344] loop1: detected capacity change from 0 to 1054 [ 2826.468865][ T1351] EXT4-fs (loop4): Invalid log block size: 1224 [ 2826.482927][ T1344] EXT4-fs (loop1): Invalid log cluster size: 12622593 10:27:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000045c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000019cc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2826.529718][ T1347] loop5: detected capacity change from 0 to 1030 [ 2826.536709][ T1351] loop4: detected capacity change from 0 to 1062 [ 2826.552534][ T1347] EXT4-fs (loop5): Invalid log cluster size: 7424 [ 2826.561856][ T1351] EXT4-fs (loop4): Invalid log block size: 1224 [ 2826.657647][ T1376] loop1: detected capacity change from 0 to 1054 [ 2826.668860][ T1376] EXT4-fs (loop1): Invalid log cluster size: 12622849 [ 2826.701466][ T1376] loop1: detected capacity change from 0 to 1054 [ 2826.709041][ T1376] EXT4-fs (loop1): Invalid log cluster size: 12622849 10:27:33 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) unshare(0xe00) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:33 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000011d0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000013c804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000046c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000019dc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000047c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2827.083890][ T1392] loop5: detected capacity change from 0 to 1030 [ 2827.095600][ T1395] loop1: detected capacity change from 0 to 1054 [ 2827.095899][ T1394] loop4: detected capacity change from 0 to 1062 [ 2827.114985][ T1392] EXT4-fs (loop5): Invalid log cluster size: 7425 10:27:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000021d0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2827.147834][ T1395] EXT4-fs (loop1): Invalid log cluster size: 12623105 [ 2827.154055][ T1394] EXT4-fs (loop4): Invalid log block size: 1224 10:27:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000014c804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000019ec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000048c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2827.283062][ T1415] loop5: detected capacity change from 0 to 1030 [ 2827.296435][ T1415] EXT4-fs (loop5): Invalid log cluster size: 7426 [ 2827.310501][ T1416] loop4: detected capacity change from 0 to 1062 10:27:33 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x7f, 0x9, 0x8, 0x0, 0x0, 0x10001, 0x500, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x1}, 0x40a44, 0x9, 0x1f, 0x9, 0x7, 0x5, 0x7, 0x0, 0x6, 0x0, 0xba7}, 0x0, 0x0, r0, 0xa) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00002e2000/0x2000)=nil, 0x2000, 0x1800003, 0x293053, r2, 0xb1f0f000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000200)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) socket(0x29, 0x1, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x6, 0xff, 0x7, 0x7, 0x0, 0x7, 0x30400, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, @perf_config_ext={0x1, 0x5}, 0x44244, 0x3f0, 0x80000001, 0x3, 0x8, 0x200, 0x400, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x1, r1, 0xa) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000), 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2827.333702][ T1424] loop1: detected capacity change from 0 to 1054 [ 2827.338549][ T1416] EXT4-fs (loop4): Invalid log block size: 1224 [ 2827.362416][ T1415] loop5: detected capacity change from 0 to 1030 [ 2827.368840][ T1424] EXT4-fs (loop1): Invalid log cluster size: 12623361 [ 2827.370818][ T1415] EXT4-fs (loop5): Invalid log cluster size: 7426 [ 2827.401536][ T1416] loop4: detected capacity change from 0 to 1062 [ 2827.420801][ T1416] EXT4-fs (loop4): Invalid log block size: 1224 [ 2827.432527][ T1424] loop1: detected capacity change from 0 to 1054 [ 2827.476879][ T1424] EXT4-fs (loop1): Invalid log cluster size: 12623361 10:27:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000031d0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000049c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000019fc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000015c804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:34 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4b}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2828.048323][ T1462] loop4: detected capacity change from 0 to 1062 [ 2828.071383][ T1463] loop1: detected capacity change from 0 to 1054 [ 2828.081938][ T1462] EXT4-fs (loop4): Invalid log block size: 1224 10:27:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000004ac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2828.129604][ T1463] EXT4-fs (loop1): Invalid log cluster size: 12623617 [ 2828.130711][ T1467] loop5: detected capacity change from 0 to 1030 10:27:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000016c804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:34 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x4b}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='fscache_acquire\x00'}, 0x10) unshare(0x200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2828.219189][ T1467] EXT4-fs (loop5): Invalid log cluster size: 7427 [ 2828.233349][ T1463] loop1: detected capacity change from 0 to 1054 10:27:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000001e0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2828.262447][ T1463] EXT4-fs (loop1): Invalid log cluster size: 12623617 10:27:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000004bc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001a0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2828.305281][ T1483] loop4: detected capacity change from 0 to 1062 [ 2828.331631][ T1489] loop5: detected capacity change from 0 to 1030 [ 2828.345359][ T1489] EXT4-fs (loop5): Invalid log cluster size: 7680 [ 2828.356072][ T1483] EXT4-fs (loop4): Invalid log block size: 1224 [ 2828.391521][ T1489] loop5: detected capacity change from 0 to 1030 10:27:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000004cc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2828.401325][ T1489] EXT4-fs (loop5): Invalid log cluster size: 7680 [ 2828.416094][ T1483] loop4: detected capacity change from 0 to 1062 [ 2828.418198][ T1503] loop1: detected capacity change from 0 to 1054 [ 2828.432409][ T1483] EXT4-fs (loop4): Invalid log block size: 1224 10:27:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000011e0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000017c804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2828.479933][ T1503] EXT4-fs (loop1): Invalid log cluster size: 12623873 10:27:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000004dc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2828.591839][ T1503] loop1: detected capacity change from 0 to 1054 [ 2828.608591][ T1503] EXT4-fs (loop1): Invalid log cluster size: 12623873 [ 2828.619307][ T1519] loop5: detected capacity change from 0 to 1030 [ 2828.631813][ T1520] loop4: detected capacity change from 0 to 1062 [ 2828.654682][ T1519] EXT4-fs (loop5): Invalid log cluster size: 7681 [ 2828.654693][ T1520] EXT4-fs (loop4): Invalid log block size: 1224 10:27:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000004ec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001a1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2828.701219][ T1520] loop4: detected capacity change from 0 to 1062 [ 2828.714779][ T1520] EXT4-fs (loop4): Invalid log block size: 1224 [ 2828.732865][ T1519] loop5: detected capacity change from 0 to 1030 [ 2828.745101][ T1519] EXT4-fs (loop5): Invalid log cluster size: 7681 10:27:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000018c804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000021e0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2828.843137][ T1535] loop1: detected capacity change from 0 to 1054 [ 2828.882234][ T1535] EXT4-fs (loop1): Invalid log cluster size: 12624129 10:27:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000004fc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2828.901863][ T1541] loop5: detected capacity change from 0 to 1030 [ 2828.905908][ T1540] loop4: detected capacity change from 0 to 1062 [ 2828.932445][ T1541] EXT4-fs (loop5): Invalid log cluster size: 7682 [ 2828.945801][ T1540] EXT4-fs (loop4): Invalid log block size: 1224 10:27:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000050c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2828.951337][ T1535] loop1: detected capacity change from 0 to 1054 [ 2828.968985][ T1535] EXT4-fs (loop1): Invalid log cluster size: 12624129 [ 2829.001507][ T1540] loop4: detected capacity change from 0 to 1062 [ 2829.015682][ T1540] EXT4-fs (loop4): Invalid log block size: 1224 [ 2829.018451][ T1541] loop5: detected capacity change from 0 to 1030 10:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001a2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2829.050531][ T1541] EXT4-fs (loop5): Invalid log cluster size: 7682 10:27:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000019c804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000031e0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000051c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2829.158652][ T1560] loop1: detected capacity change from 0 to 1054 [ 2829.187312][ T1561] loop5: detected capacity change from 0 to 1030 [ 2829.192024][ T1562] loop4: detected capacity change from 0 to 1062 [ 2829.225289][ T1561] EXT4-fs (loop5): Invalid log cluster size: 7683 [ 2829.233786][ T1560] EXT4-fs (loop1): Invalid log cluster size: 12624385 10:27:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000052c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2829.269988][ T1562] EXT4-fs (loop4): Invalid log block size: 1224 [ 2829.292500][ T1560] loop1: detected capacity change from 0 to 1054 [ 2829.308885][ T1560] EXT4-fs (loop1): Invalid log cluster size: 12624385 10:27:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000001f0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000001ac804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001a3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000053c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2829.418877][ T1577] loop5: detected capacity change from 0 to 1030 [ 2829.435948][ T1578] loop4: detected capacity change from 0 to 1062 [ 2829.462559][ T1577] EXT4-fs (loop5): Invalid log cluster size: 7936 [ 2829.464972][ T1578] EXT4-fs (loop4): Invalid log block size: 1224 [ 2829.475161][ T1584] loop1: detected capacity change from 0 to 1054 [ 2829.500614][ T1584] EXT4-fs (loop1): Invalid log cluster size: 12624641 10:27:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000054c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2829.544671][ T1577] loop5: detected capacity change from 0 to 1030 [ 2829.547876][ T1578] loop4: detected capacity change from 0 to 1062 [ 2829.562947][ T1577] EXT4-fs (loop5): Invalid log cluster size: 7936 [ 2829.571434][ T1584] loop1: detected capacity change from 0 to 1054 10:27:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000011f0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2829.588903][ T1584] EXT4-fs (loop1): Invalid log cluster size: 12624641 [ 2829.594210][ T1578] EXT4-fs (loop4): Invalid log block size: 1224 10:27:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000001bc804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001a4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000055c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2829.750359][ T1600] loop4: detected capacity change from 0 to 1062 [ 2829.757902][ T1603] loop5: detected capacity change from 0 to 1030 [ 2829.797775][ T1600] EXT4-fs (loop4): Invalid log block size: 1224 [ 2829.808561][ T1603] EXT4-fs (loop5): Invalid log cluster size: 7937 [ 2829.822871][ T1608] loop1: detected capacity change from 0 to 1054 10:27:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000056c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:36 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8504, 0x0, 0x0, 0x2, 0x0, 0x7fff, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200), 0x100, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0x8, 0x0, 0x4f, 0x8, 0x0, 0x8, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x52, 0x3, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0x1ff, 0xb7, 0x1, 0x80000000, 0xfffffffa, 0x8, 0x0, 0x6, 0x0, 0x4}, r2, 0x5, r4, 0x0) [ 2829.863363][ T1608] EXT4-fs (loop1): Invalid log cluster size: 12624897 [ 2829.882120][ T1600] loop4: detected capacity change from 0 to 1062 [ 2829.883118][ T1603] loop5: detected capacity change from 0 to 1030 [ 2829.902766][ T1600] EXT4-fs (loop4): Invalid log block size: 1224 10:27:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000001cc804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2829.928993][ T1603] EXT4-fs (loop5): Invalid log cluster size: 7937 [ 2829.968476][ T1608] loop1: detected capacity change from 0 to 1054 [ 2829.979007][ T1608] EXT4-fs (loop1): Invalid log cluster size: 12624897 10:27:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000021f0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000057c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2830.033380][ T1625] loop4: detected capacity change from 0 to 1062 10:27:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001a5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2830.077146][ T1625] EXT4-fs (loop4): Invalid log block size: 1224 [ 2830.104486][ T1632] loop5: detected capacity change from 0 to 1030 10:27:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000058c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2830.165900][ T1625] loop4: detected capacity change from 0 to 1062 [ 2830.188414][ T1625] EXT4-fs (loop4): Invalid log block size: 1224 [ 2830.198191][ T1632] EXT4-fs (loop5): Invalid log cluster size: 7938 10:27:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000001dc804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000059c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2830.227324][ T1640] loop1: detected capacity change from 0 to 1054 [ 2830.262629][ T1640] EXT4-fs (loop1): Invalid log cluster size: 12625153 10:27:36 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0x10) poll(&(0x7f0000000200)=[{r0, 0x810c}], 0x1, 0x81) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) unshare(0x14000000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2830.283978][ T1632] loop5: detected capacity change from 0 to 1030 [ 2830.301620][ T1640] loop1: detected capacity change from 0 to 1054 [ 2830.309305][ T1640] EXT4-fs (loop1): Invalid log cluster size: 12625153 [ 2830.309305][ T1632] EXT4-fs (loop5): Invalid log cluster size: 7938 10:27:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001a6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000005ac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2830.343554][ T1651] loop4: detected capacity change from 0 to 1062 [ 2830.372410][ T1651] EXT4-fs (loop4): Invalid log block size: 1224 10:27:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000031f0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2830.404451][ T1664] loop1: detected capacity change from 0 to 1054 [ 2830.413392][ T1664] EXT4-fs (loop1): Invalid log cluster size: 12625409 [ 2830.423480][ T1651] loop4: detected capacity change from 0 to 1062 [ 2830.445370][ T1651] EXT4-fs (loop4): Invalid log block size: 1224 [ 2830.494638][ T1664] loop1: detected capacity change from 0 to 1054 [ 2830.510653][ T1677] loop5: detected capacity change from 0 to 1030 [ 2830.511305][ T1664] EXT4-fs (loop1): Invalid log cluster size: 12625409 [ 2830.524963][ T1677] EXT4-fs (loop5): Invalid log cluster size: 7939 [ 2830.571293][ T1677] loop5: detected capacity change from 0 to 1030 [ 2830.595439][ T1677] EXT4-fs (loop5): Invalid log cluster size: 7939 10:27:37 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000140)) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000001ec804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000005bc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001a7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:37 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) unshare(0x2040000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3, 0x0, 0x7f}, 0x0, 0x0, r0, 0x0) unshare(0x48050200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000200000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000005cc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2831.070952][ T1705] loop5: detected capacity change from 0 to 1030 [ 2831.073592][ T1707] loop1: detected capacity change from 0 to 1054 [ 2831.095377][ T1709] loop4: detected capacity change from 0 to 1062 [ 2831.142204][ T1707] EXT4-fs (loop1): Invalid log cluster size: 12625665 [ 2831.167325][ T1705] EXT4-fs (loop5): Invalid log cluster size: 8192 [ 2831.182431][ T1709] EXT4-fs (loop4): Invalid log block size: 1224 10:27:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001200000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:37 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e00f3f8"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000128bd7000fcdbdf253b0000001200cd001c00084000480500a2e0d78604000000"], 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x1) unshare(0x200) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000), 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000005dc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2831.301894][ T1707] loop1: detected capacity change from 0 to 1054 [ 2831.308862][ T1709] loop4: detected capacity change from 0 to 1062 [ 2831.325812][ T1707] EXT4-fs (loop1): Invalid log cluster size: 12625665 [ 2831.333926][ T1709] EXT4-fs (loop4): Invalid log block size: 1224 10:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001a8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000001fc804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2831.414481][ T1734] loop5: detected capacity change from 0 to 1030 [ 2831.443119][ T1734] EXT4-fs (loop5): Invalid log cluster size: 8193 [ 2831.491023][ T1746] loop1: detected capacity change from 0 to 1054 [ 2831.507447][ T1746] EXT4-fs (loop1): Invalid log cluster size: 12625921 [ 2831.514634][ T1745] loop4: detected capacity change from 0 to 1062 [ 2831.519340][ T1734] loop5: detected capacity change from 0 to 1030 [ 2831.527957][ T1745] EXT4-fs (loop4): Invalid log block size: 1224 [ 2831.540812][ T1734] EXT4-fs (loop5): Invalid log cluster size: 8193 [ 2831.556086][ T1746] loop1: detected capacity change from 0 to 1054 [ 2831.601980][ T1746] EXT4-fs (loop1): Invalid log cluster size: 12625921 10:27:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000020c804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:38 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000140)) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000005ec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002200000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001a9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:38 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000001200)={0x2, &(0x7f0000000180)=[{0x8, 0x1000, &(0x7f0000000200)="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", 0x1, 0x1}, {0x1, 0x19, &(0x7f0000000140)="886e05e4afc250834037634225db53eae7ce81229ba09f4ec1"}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = fsmount(0xffffffffffffffff, 0x0, 0x7e) fcntl$dupfd(r1, 0x406, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000), 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2832.012364][ T1769] loop4: detected capacity change from 0 to 1062 [ 2832.022738][ T1774] loop5: detected capacity change from 0 to 1030 [ 2832.034893][ T1776] loop1: detected capacity change from 0 to 1054 10:27:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000005fc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2832.080118][ T1769] EXT4-fs (loop4): Invalid log block size: 1224 [ 2832.088152][ T1774] EXT4-fs (loop5): Invalid log cluster size: 8194 10:27:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000021c804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003200000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2832.135633][ T1776] EXT4-fs (loop1): Invalid log cluster size: 12626177 [ 2832.205786][ T1776] loop1: detected capacity change from 0 to 1054 [ 2832.227413][ T1776] EXT4-fs (loop1): Invalid log cluster size: 12626177 10:27:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000060c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:38 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x1006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:38 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x200000, 0x4) openat(r1, &(0x7f0000000280)='./file0\x00', 0x0, 0x1e8) unshare(0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x4, 0x5, 0x2, 0x8, 0x0, 0x6, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffff801, 0x4, @perf_bp={&(0x7f0000000140), 0x4}, 0x41010, 0x9, 0x6, 0x6, 0x0, 0xffff, 0x3a, 0x0, 0x8b5, 0x0, 0x3}, 0xffffffffffffffff, 0x3, r0, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2832.258291][ T1802] loop4: detected capacity change from 0 to 1062 [ 2832.279853][ T1805] loop5: detected capacity change from 0 to 1030 [ 2832.298429][ T1802] EXT4-fs (loop4): Invalid log block size: 1224 10:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001aac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000061c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2832.321331][ T1805] EXT4-fs (loop5): Invalid log cluster size: 8195 [ 2832.367804][ T1802] loop4: detected capacity change from 0 to 1062 [ 2832.377305][ T1818] loop1: detected capacity change from 0 to 1054 [ 2832.378919][ T1802] EXT4-fs (loop4): Invalid log block size: 1224 [ 2832.395238][ T1818] EXT4-fs (loop1): Invalid log cluster size: 12626433 [ 2832.404496][ T1805] loop5: detected capacity change from 0 to 1030 10:27:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000022c804000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000062c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2832.421580][ T1805] EXT4-fs (loop5): Invalid log cluster size: 8195 [ 2832.453260][ T1818] loop1: detected capacity change from 0 to 1054 10:27:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000210000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:38 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000140)={0x7, 'batadv_slave_1\x00', {0x6}, 0x3ff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) sendto$inet6(r3, &(0x7f0000000200)="35e569a385b47c8914e06b8b2762c287458fa641b2b76db5b9677e340ffd131bbe59fac5ac371e207c643940094b999230b87218958b76885125d822ee14ebe6e7e5bf4197499d5dfd86f64a59b24bf26cf1b102308d5023584eb743317a18790528bca5e7819c40956f71ddec1b197e085325daa22f5ae6a4ba3b08ca7b0001aca544bf6ad7fe6c0c760b8cafc04f94c6de08e6ecd136804d757ffb5cee6d0917", 0xa1, 0x1, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2832.481117][ T1818] EXT4-fs (loop1): Invalid log cluster size: 12626433 10:27:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000063c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:38 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x8001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr, 0x2}, 0x1c) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) readahead(r3, 0x4, 0x4) 10:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001abc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2832.546413][ T1843] loop4: detected capacity change from 0 to 1062 [ 2832.581828][ T1847] loop5: detected capacity change from 0 to 1030 [ 2832.584853][ T1843] EXT4-fs (loop4): Invalid log block size: 1224 10:27:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000064c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2832.633527][ T1847] EXT4-fs (loop5): Invalid log cluster size: 8448 [ 2832.663556][ T1843] loop4: detected capacity change from 0 to 1062 10:27:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2832.683376][ T1847] loop5: detected capacity change from 0 to 1030 [ 2832.689966][ T1843] EXT4-fs (loop4): Invalid log block size: 1224 [ 2832.693483][ T1865] loop1: detected capacity change from 0 to 1054 [ 2832.704647][ T1847] EXT4-fs (loop5): Invalid log cluster size: 8448 [ 2832.720830][ T1865] EXT4-fs (loop1): Invalid log cluster size: 12626689 10:27:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000065c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000066c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001210000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2832.794789][ T1865] loop1: detected capacity change from 0 to 1054 [ 2832.809255][ T1865] EXT4-fs (loop1): Invalid log cluster size: 12626689 10:27:39 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x200100, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x80, 0x3, 0x3f, 0x8, 0x40, 0x0, 0x3ff, 0x2c300, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x100, 0x5d3, 0x1eb, 0x3, 0x7, 0x58, 0x3, 0x0, 0x7, 0x0, 0x2}, r0, 0x10, r1, 0x5) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000), 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000067c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001acc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2832.892206][ T1893] loop4: detected capacity change from 0 to 1062 [ 2832.903680][ T1894] loop5: detected capacity change from 0 to 1030 [ 2832.924113][ T1893] EXT4-fs (loop4): Invalid log block size: 51204 [ 2832.935063][ T1894] EXT4-fs (loop5): Invalid log cluster size: 8449 [ 2832.958447][ T1903] loop1: detected capacity change from 0 to 1054 [ 2832.971949][ T1903] EXT4-fs (loop1): Invalid log cluster size: 12626945 [ 2832.981969][ T1893] loop4: detected capacity change from 0 to 1062 [ 2832.994294][ T1894] loop5: detected capacity change from 0 to 1030 [ 2833.003012][ T1893] EXT4-fs (loop4): Invalid log block size: 51204 [ 2833.005421][ T1894] EXT4-fs (loop5): Invalid log cluster size: 8449 [ 2833.023639][ T1903] loop1: detected capacity change from 0 to 1054 [ 2833.042854][ T1903] EXT4-fs (loop1): Invalid log cluster size: 12626945 10:27:39 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000140)={0xff, 0xa4, 0x5a5b3c3b, 0x8000, 0x8365, 0x3}) bind$inet6(r2, &(0x7f0000000000), 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000068c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000010004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002210000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:39 executing program 0: ioctl$SNDCTL_DSP_GETIPTR(0xffffffffffffffff, 0x800c5011, &(0x7f0000000140)) mmap(&(0x7f0000322000/0x2000)=nil, 0x2000, 0x9, 0x8010, 0xffffffffffffffff, 0x5ef5e000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000320000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x40a74000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000180), &(0x7f0000000240)=0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) unshare(0x42000000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001adc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2833.437913][ T1937] loop4: detected capacity change from 0 to 1062 [ 2833.462135][ T1940] loop1: detected capacity change from 0 to 1054 [ 2833.473502][ T1943] loop5: detected capacity change from 0 to 1030 10:27:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000069c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2833.482866][ T1937] EXT4-fs (loop4): Invalid log block size: 65536 [ 2833.522721][ T1943] EXT4-fs (loop5): Invalid log cluster size: 8450 [ 2833.531953][ T1940] EXT4-fs (loop1): Invalid log cluster size: 12627201 [ 2833.542982][ T1937] loop4: detected capacity change from 0 to 1062 [ 2833.559071][ T1937] EXT4-fs (loop4): Invalid log block size: 65536 10:27:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000006ac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8010004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2833.568516][ T1943] loop5: detected capacity change from 0 to 1030 [ 2833.577668][ T1940] loop1: detected capacity change from 0 to 1054 [ 2833.607322][ T1940] EXT4-fs (loop1): Invalid log cluster size: 12627201 [ 2833.624887][ T1943] EXT4-fs (loop5): Invalid log cluster size: 8450 10:27:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000006bc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001aec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003210000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2833.742048][ T2015] loop4: detected capacity change from 0 to 1062 [ 2833.785381][ T2015] EXT4-fs (loop4): Invalid log block size: 116740 [ 2833.793109][ T2021] loop1: detected capacity change from 0 to 1054 [ 2833.802646][ T2021] EXT4-fs (loop1): Invalid log cluster size: 12627457 [ 2833.805119][ T2023] loop5: detected capacity change from 0 to 1030 [ 2833.824384][ T2023] EXT4-fs (loop5): Invalid log cluster size: 8451 [ 2833.836081][ T2015] loop4: detected capacity change from 0 to 1062 [ 2833.837684][ T2021] loop1: detected capacity change from 0 to 1054 [ 2833.851118][ T2015] EXT4-fs (loop4): Invalid log block size: 116740 [ 2833.851967][ T2021] EXT4-fs (loop1): Invalid log cluster size: 12627457 [ 2833.892491][ T2023] loop5: detected capacity change from 0 to 1030 [ 2833.912853][ T2023] EXT4-fs (loop5): Invalid log cluster size: 8451 10:27:40 executing program 3: sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x2c, 0x0, 0x279c27c943706b28, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x8}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x2}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x6}]}, 0x2c}}, 0xc010) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000006cc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:40 executing program 0: ioctl$SNDCTL_DSP_GETIPTR(0xffffffffffffffff, 0x800c5011, &(0x7f0000000140)) mmap(&(0x7f0000322000/0x2000)=nil, 0x2000, 0x9, 0x8010, 0xffffffffffffffff, 0x5ef5e000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000320000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x40a74000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000180), &(0x7f0000000240)=0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) unshare(0x42000000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000020004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001afc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000220000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2834.400928][ T2054] loop5: detected capacity change from 0 to 1030 10:27:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000006dc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2834.442738][ T2057] loop4: detected capacity change from 0 to 1062 [ 2834.445841][ T2058] loop1: detected capacity change from 0 to 1054 [ 2834.465047][ T2054] EXT4-fs (loop5): Invalid log cluster size: 8704 [ 2834.503070][ T2058] EXT4-fs (loop1): Invalid log cluster size: 12627713 [ 2834.534537][ T2057] EXT4-fs (loop4): Invalid log block size: 131072 10:27:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2834.570379][ T2054] loop5: detected capacity change from 0 to 1030 [ 2834.591303][ T2054] EXT4-fs (loop5): Invalid log cluster size: 8704 10:27:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000006ec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8020004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:40 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x3f, 0x20, 0x80, 0x80, 0x0, 0x5, 0x4020, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xeb, 0x1, @perf_config_ext={0x1, 0x80000001}, 0x800, 0xffffffff, 0x7f, 0x5, 0x7, 0x64, 0x7f, 0x0, 0x1, 0x0, 0xcc}, 0xffffffffffffffff, 0x4, r2, 0x8) unshare(0x200) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f00000000c0)=0x1, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0xff, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3, 0x4, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001220000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000183c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2834.732070][ T2101] loop1: detected capacity change from 0 to 1054 [ 2834.766626][ T2101] EXT4-fs (loop1): Invalid log cluster size: 12627969 10:27:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000006fc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2834.788385][ T2107] loop5: detected capacity change from 0 to 1030 [ 2834.808377][ T2109] loop4: detected capacity change from 0 to 1062 [ 2834.821758][ T2101] loop1: detected capacity change from 0 to 1054 [ 2834.838870][ T2109] EXT4-fs (loop4): Invalid log block size: 182276 [ 2834.847630][ T2101] EXT4-fs (loop1): Invalid log cluster size: 12627969 [ 2834.854572][ T2107] EXT4-fs (loop5): Invalid log cluster size: 8705 10:27:41 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @dev}, &(0x7f0000000180)=0x10) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r1, 0xf504, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$bfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="2c9c000aeb8ba9d1f2391fd3428a6479a40d394a570cb486411167e2f4dce8707439c83ee036678f72083d7c28ef4b436c40f691b8bc3c97338a0c310f0898d1e4ceb4fc9bffe9d50dc1efaa4b808eb2f152d25fe8e8ead2b9c0b2ab28a57907f10e5c6dd479349f54bf7714d8890d5834cf802a9993", 0x76, 0xfff}, {&(0x7f0000000300)="9901c225aa2e7d46faabb792874e7794d1c3419845e4cda1dc2bdfd321431226e341ebb590dfc6e173a3e1cc05717efd860c4a56fdfa211b00e0c97f90d24432a6f25d2c7a6cfa42668f2434926916e4fea35b01e369b02e51ac7403eb081c7a9f99c16c55ab81d026a498700c24b5b97d52ed6a940cdd3179af928e363fd08027aa4603444d9201960d07a705de26de47d5c4b6ef36054e60530702d5323d0438e4bacce707d399ca818fd49c5c9e8421ae571a87eb83f1a7eb50eded99472c73f551acb2d7b05ab3bf082a3f6feedd8783530799f6c23654ac11a4da3df48cf777e56fd11d05824779b611285316c0163de0f2b2b9c3b83e04ec3e8aef", 0xfe, 0x400}], 0x2802800, &(0x7f0000000500)=ANY=[@ANYBLOB="2c61756469742c61707072616973655f747970653d696d617369672c646f6e745f61707072616942572f3c0de4461bf2c337da471573652c7065726d69745f646972656374696f2c6f626a5f747970653d2f7b252c61756469742c686173682c7063723d30303030303030303030303030303030303034332c7065726d69745f646972656374696f2c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000004c0)={0x40000000}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000), 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:41 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) listen(r1, 0x0) shutdown(r1, 0x0) r2 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 10:27:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2834.901644][ T2107] loop5: detected capacity change from 0 to 1030 [ 2834.932028][ T2107] EXT4-fs (loop5): Invalid log cluster size: 8705 [ 2834.933964][ T2109] loop4: detected capacity change from 0 to 1062 10:27:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000070c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2834.969343][ T2109] EXT4-fs (loop4): Invalid log block size: 182276 10:27:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002220000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000030004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2835.111743][ T2137] loop1: detected capacity change from 0 to 1054 [ 2835.148087][ T2137] EXT4-fs (loop1): Invalid log cluster size: 12628225 10:27:41 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xfffffdfeffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000007c0)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5(\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv(Qa\xf3\xd4\xfc(\x83\xfb\xf8)\xf6\x8a$\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb#f\xc1\xb9\x81W\xa4$)!\v\x9b\xa7\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\x03\xb4\xd2;\xad\x94\x96\xacSo\\\x0e\xfb\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1JA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xc2P\x9b5\xf6\x1e\x13$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\"\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6\x18u\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f\x00D\xc95\xdeG +\xa6I\xfe\x01\xe3-\xe8\xbd\xfd\x1bk\x94/\x1e\xb8\x1bp\xf4\t\x94\x87\xf1ZbO\xa6\xe9\f`u\xda\xb3\x1d\xf9\x94\x80\xc1\x17\xde(_\xa7\xe7\x11\x9a\xac\x8c\xb1\xd71\xc5\xe9\xd3n\xc2\xa4\x98P\x9aF\xc2\x93\xad@\xa9h\x96\x1b]2\x88\xf3\xd8\xc798\x8c\x9f\xd4W4\xf1}\aD\xa0\xd8\xda\xf4\x1bEx(t|\xf4Y\xfaJ\xc2GS\xc9R\xb5\xda\xa8\x9b\xaa\x01\xe2~\xd8f.#\x94\xbf\x85z\xbf\xa0x62L\x1f\x91\xd2\x1e%\x88\x1f\f\xabb\x8ds\x93\x9e\xed\xd2\xdb\x02\x0e\xcf\xf5\xaf\xc8>+\x03e\xb7\xba\xb9}\xca\xfc\xe8\xed\x9b\xa2\x9ey\bMv\x8f\x8a8\xfd;\x9a5J\xee\x9a\xae\x83>$\x8a6\x05P\x8c\x05\xb8\r\xcf\xdd\x15/\xa9\xa1\xd4\x87{\xc9I4\xe3 i\xa4\xc5\xe5l\x03?\xfdM&\xc0a9\x9bh\x8ef\x10!\xf0\x99\x80\xb72\xcc\x06\'+\xf0\xa1\a\xeeSGH\x12\x068S7s\xd3\xdaT\"\xa9jk\xed\xa2IyM\xa3&t\xfeA\xa9\"\xb4\xec\xdex\x00\x80`p\x91\x84\xbfK\xb6\x00\xa7\xa2\x06\xce\xc8X\x7f\xd1@\xf1\xcf\xdf\xae\xdb\r\xf6h\xdf\xc6+\xac\r\x9f\xc2D\xdf\xd6\xde`\xa4\xd1=\x1b\x8d\xf4\xbe#\tH\x06;a(`\xdcw\x1dc_\v\x046j\xf9`\r\xc0\a\x8d\x12:l\xc7j3E\xd7\xcaX\x97\xad\x93\xea\x99\xca\xd7m\xb8\x1e1\xb6Nz\"U/\x0eP\b=\x01W\xcd\xf1x\x85\xf4&\xe7\xf9W\x06\xa4\xf8&\xbc\xf4\xd0\xd2\xd1W\xee\x9a\xdd\xdbu\x0e\x9aV\xe2\xc5\x84`Bu\x12\xa8/=\x17\xc4F\x11\xdfm-)\xd9hc\xba\xb7\x91\xd9\x11\x9a,\x19\xf4]\xa7Y@B\x1f\xa8\x06\x88\x8e\xf4\xbc\xad\xc0M\x91rFJ\x03\xac \xb9\x0e\xb58g\xaf\x849\x9c|\xfdq6\xfb)\xc6H\x8f\xc5\xa7\x93\xfd\x89pzp\xb4\n\xbd\xb2\xb2\xa8!\xb2N\xbb3\x9co\x0e!\nD\x7f\xe7\xf8\xd8YN\xaf\x1c\xf7\xe2\xfd\xf6\x0f\x938\xbf\xfd\x0f\x97Z\x9d1\xf5\x11\xc6\xdb\f\x81uB\xd4/A\x90\x9e\xa3Z\x02\f\xcb\xed\xb2\x8b\xe1\xb9U\x11\xf0s\xdb\x10\xdc\x03\xd2\x9b\x1f\xd6\x8a\xb8zo\xd2\x99\xd5\x84\xf7\x1a\x92K\xbfg\x87\xf4\x8e\xf7*\xb8.\xbe\xaes\x11\xc6\x93\x87\x14\xe0\xec\xc6\xbci\xbb}\xe3\xd2N\xbd\x95\xe1\xbb\xf9\xd8X\x15_\"\xe2`\x80\xa3\xe8\xd2\x8f\xa3\xcf\x1b\x02\xb0\xe9\xd1\x13C$\x1dit\xfff9?\'\xce\x1c\x19(=\x8f\x1bdR\x19\xc1\xdbdi=\xe6\xb1rs\xfc\xa4^9y>\x19k\xd3\x154\xe4\n\xffF\x0f\xca\x1dI\x15\xb8\xb2\x18:p\xad\xa68q\x00\x00\x00\x00') perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) 10:27:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000071c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2835.203298][ T2137] loop1: detected capacity change from 0 to 1054 [ 2835.209899][ T2142] loop5: detected capacity change from 0 to 1030 [ 2835.220476][ T2137] EXT4-fs (loop1): Invalid log cluster size: 12628225 [ 2835.224998][ T2145] loop4: detected capacity change from 0 to 1062 [ 2835.245007][ T2142] EXT4-fs (loop5): Invalid log cluster size: 8706 10:27:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2835.271347][ T2145] EXT4-fs (loop4): Invalid log block size: 196608 10:27:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000072c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2835.315464][ T2142] loop5: detected capacity change from 0 to 1030 [ 2835.333049][ T2145] loop4: detected capacity change from 0 to 1062 [ 2835.336147][ T2176] loop1: detected capacity change from 0 to 1054 [ 2835.351528][ T2142] EXT4-fs (loop5): Invalid log cluster size: 8706 10:27:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003220000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2835.390254][ T3259] ieee802154 phy0 wpan0: encryption failed: -22 [ 2835.397071][ T3259] ieee802154 phy1 wpan1: encryption failed: -22 [ 2835.412057][ T2176] EXT4-fs (loop1): Invalid log cluster size: 12628481 [ 2835.418976][ T2145] EXT4-fs (loop4): Invalid log block size: 196608 10:27:41 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x50d, 0x460d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x4b}, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x25, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0xb818, 0x88, 0x3, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f00000000c0)={0x10000010}) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2835.490665][ T2176] loop1: detected capacity change from 0 to 1054 [ 2835.503826][ T2176] EXT4-fs (loop1): Invalid log cluster size: 12628481 [ 2835.531125][ T2195] loop5: detected capacity change from 0 to 1030 [ 2835.555196][ T2195] EXT4-fs (loop5): Invalid log cluster size: 8707 [ 2835.621511][ T2195] loop5: detected capacity change from 0 to 1030 [ 2835.629067][ T2195] EXT4-fs (loop5): Invalid log cluster size: 8707 10:27:42 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @dev}, &(0x7f0000000180)=0x10) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r1, 0xf504, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$bfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="2c9c000aeb8ba9d1f2391fd3428a6479a40d394a570cb486411167e2f4dce8707439c83ee036678f72083d7c28ef4b436c40f691b8bc3c97338a0c310f0898d1e4ceb4fc9bffe9d50dc1efaa4b808eb2f152d25fe8e8ead2b9c0b2ab28a57907f10e5c6dd479349f54bf7714d8890d5834cf802a9993", 0x76, 0xfff}, {&(0x7f0000000300)="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", 0xfe, 0x400}], 0x2802800, &(0x7f0000000500)=ANY=[@ANYBLOB="2c61756469742c61707072616973655f747970653d696d617369672c646f6e745f61707072616942572f3c0de4461bf2c337da471573652c7065726d69745f646972656374696f2c6f626a5f747970653d2f7b252c61756469742c686173682c7063723d30303030303030303030303030303030303034332c7065726d69745f646972656374696f2c00"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000004c0)={0x40000000}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000), 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000073c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8030004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:42 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r3, &(0x7f0000000080)={0x27, 0x0, 0x20000000, 0x0, 0x0, 0x0, "b1b4275d835d7495ec58ffa71bc966b3f747718234dc799838b4124d6ef439bf2b4452de8d712d37b120e90bf0bf5730859c641605167a07cf3f745e54df58", 0x28}, 0x60) sendmmsg$nfc_llcp(r3, &(0x7f0000005c40)=[{&(0x7f0000002480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac220cb68ae7c1dd7bf3c4542afec9d8491b568f3b437a0ff8658a749ca15908c34cdcca90028d804774c72eadfe6b8984ecee02b427b1f31aaf8b5affec62"}, 0x60, &(0x7f0000004780)=[{&(0x7f0000002540)="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", 0xe75}, {0x0}, {&(0x7f0000000200)="549afeccffff00004fab6f89c356b7842b3b20c24c67af76c114c3bf6597da7281f6252f23bc7d598e8d16dfcedc1661d5f8b5d467cc21b7c0f1a2f47c229870bb28b09d6369d80d6c6bb3ccf0cb1bef719a4761de87f348fffc181338b1872508aae720a6a61f8721844edc8c14c7067f42cdd34a205d6ba44612468c09ebce4478f53e97d2dc9e69053ca25a356d6e89376c642d87", 0x96}], 0x3}], 0x1, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) gettid() 10:27:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000230000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2835.870555][ T2214] loop1: detected capacity change from 0 to 1054 [ 2835.888239][ T2216] loop4: detected capacity change from 0 to 1062 [ 2835.920102][ T2220] loop5: detected capacity change from 0 to 1030 [ 2835.935589][ T2214] EXT4-fs (loop1): Invalid log cluster size: 12628737 10:27:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000074c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2835.965313][ T2216] EXT4-fs (loop4): Invalid log block size: 247812 [ 2836.013648][ T2214] loop1: detected capacity change from 0 to 1054 [ 2836.019140][ T2220] EXT4-fs (loop5): Invalid log cluster size: 8960 [ 2836.036099][ T2214] EXT4-fs (loop1): Invalid log cluster size: 12628737 10:27:42 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r3, &(0x7f0000000080)={0x27, 0x0, 0x20000000, 0x0, 0x0, 0x0, "b1b4275d835d7495ec58ffa71bc966b3f747718234dc799838b4124d6ef439bf2b4452de8d712d37b120e90bf0bf5730859c641605167a07cf3f745e54df58", 0x28}, 0x60) sendmmsg$nfc_llcp(r3, &(0x7f0000005c40)=[{&(0x7f0000002480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac220cb68ae7c1dd7bf3c4542afec9d8491b568f3b437a0ff8658a749ca15908c34cdcca90028d804774c72eadfe6b8984ecee02b427b1f31aaf8b5affec62"}, 0x60, &(0x7f0000004780)=[{&(0x7f0000002540)="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", 0xe75}, {0x0}, {&(0x7f0000000200)="549afeccffff00004fab6f89c356b7842b3b20c24c67af76c114c3bf6597da7281f6252f23bc7d598e8d16dfcedc1661d5f8b5d467cc21b7c0f1a2f47c229870bb28b09d6369d80d6c6bb3ccf0cb1bef719a4761de87f348fffc181338b1872508aae720a6a61f8721844edc8c14c7067f42cdd34a205d6ba44612468c09ebce4478f53e97d2dc9e69053ca25a356d6e89376c642d87", 0x96}], 0x3}], 0x1, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) gettid() [ 2836.062933][ T2220] loop5: detected capacity change from 0 to 1030 [ 2836.072113][ T2216] loop4: detected capacity change from 0 to 1062 [ 2836.087594][ T2216] EXT4-fs (loop4): Invalid log block size: 247812 [ 2836.095544][ T2220] EXT4-fs (loop5): Invalid log cluster size: 8960 10:27:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000075c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001230000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000040004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2836.224144][ T2249] loop1: detected capacity change from 0 to 1054 [ 2836.251572][ T2252] loop4: detected capacity change from 0 to 1062 [ 2836.263821][ T2252] EXT4-fs (loop4): Invalid log block size: 262144 [ 2836.277977][ T2249] EXT4-fs (loop1): Invalid log cluster size: 12628993 [ 2836.303639][ T2252] loop4: detected capacity change from 0 to 1062 [ 2836.325957][ T2252] EXT4-fs (loop4): Invalid log block size: 262144 [ 2836.335091][ T2260] loop5: detected capacity change from 0 to 1030 [ 2836.346448][ T2249] loop1: detected capacity change from 0 to 1054 [ 2836.371138][ T2249] EXT4-fs (loop1): Invalid log cluster size: 12628993 [ 2836.415978][ T2260] EXT4-fs (loop5): Invalid log cluster size: 8961 [ 2836.483668][ T2260] loop5: detected capacity change from 0 to 1030 [ 2836.499445][ T2260] EXT4-fs (loop5): Invalid log cluster size: 8961 10:27:43 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) 10:27:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000076c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:43 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r3, &(0x7f0000000080)={0x27, 0x0, 0x20000000, 0x0, 0x0, 0x0, "b1b4275d835d7495ec58ffa71bc966b3f747718234dc799838b4124d6ef439bf2b4452de8d712d37b120e90bf0bf5730859c641605167a07cf3f745e54df58", 0x28}, 0x60) sendmmsg$nfc_llcp(r3, &(0x7f0000005c40)=[{&(0x7f0000002480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac220cb68ae7c1dd7bf3c4542afec9d8491b568f3b437a0ff8658a749ca15908c34cdcca90028d804774c72eadfe6b8984ecee02b427b1f31aaf8b5affec62"}, 0x60, &(0x7f0000004780)=[{&(0x7f0000002540)="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", 0xe75}, {0x0}, {&(0x7f0000000200)="549afeccffff00004fab6f89c356b7842b3b20c24c67af76c114c3bf6597da7281f6252f23bc7d598e8d16dfcedc1661d5f8b5d467cc21b7c0f1a2f47c229870bb28b09d6369d80d6c6bb3ccf0cb1bef719a4761de87f348fffc181338b1872508aae720a6a61f8721844edc8c14c7067f42cdd34a205d6ba44612468c09ebce4478f53e97d2dc9e69053ca25a356d6e89376c642d87", 0x96}], 0x3}], 0x1, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) gettid() 10:27:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8040004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002230000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2836.897539][ T2278] loop4: detected capacity change from 0 to 1062 [ 2836.912872][ T2279] loop5: detected capacity change from 0 to 1030 [ 2836.918842][ T2280] loop1: detected capacity change from 0 to 1054 [ 2836.937253][T16645] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2836.971526][ T2278] EXT4-fs (loop4): Invalid log block size: 313348 [ 2837.003339][ T2280] EXT4-fs (loop1): Invalid log cluster size: 12629249 10:27:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000077c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2837.016146][ T2279] EXT4-fs (loop5): Invalid log cluster size: 8962 10:27:43 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x92fc8e055c7310ea) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="82ae59a1ac957219b094d4c1bb14a71d", 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003230000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2837.063327][ T2278] loop4: detected capacity change from 0 to 1062 [ 2837.095911][ T2278] EXT4-fs (loop4): Invalid log block size: 313348 10:27:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000050004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2837.208605][ T2301] loop5: detected capacity change from 0 to 1030 10:27:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000078c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2837.272895][ T2301] EXT4-fs (loop5): Invalid log cluster size: 8963 [ 2837.282359][ T2308] loop1: detected capacity change from 0 to 1054 [ 2837.298724][ T2312] loop4: detected capacity change from 0 to 1062 [ 2837.321915][ T2301] loop5: detected capacity change from 0 to 1030 [ 2837.340065][ T2308] EXT4-fs (loop1): Invalid log cluster size: 12629505 [ 2837.358782][ T2301] EXT4-fs (loop5): Invalid log cluster size: 8963 [ 2837.368918][ T2312] EXT4-fs (loop4): Invalid log block size: 327680 10:27:44 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = signalfd(r0, &(0x7f0000000200), 0x8) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0x2, 0x81, 0x9, 0x3, 0x0, 0x40, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x32b2, 0x1, @perf_config_ext={0x6, 0x2}, 0x10200, 0x401, 0x26, 0x1baab7b2f6d69e19, 0x4, 0xff, 0x6, 0x0, 0x1f, 0x0, 0x10002}, r1, 0x6, 0xffffffffffffffff, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:44 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x92fc8e055c7310ea) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="82ae59a1ac957219b094d4c1bb14a71d", 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000079c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8050004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000240000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000007ac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2837.843703][ T2332] loop1: detected capacity change from 0 to 1054 [ 2837.860044][ T2330] loop4: detected capacity change from 0 to 1062 [ 2837.867552][ T2334] loop5: detected capacity change from 0 to 1030 [ 2837.873819][ T2332] EXT4-fs (loop1): Invalid log cluster size: 12629761 [ 2837.923537][ T2330] EXT4-fs (loop4): Invalid log block size: 378884 [ 2837.926950][ T2334] EXT4-fs (loop5): Invalid log cluster size: 9216 10:27:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000060004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2837.987015][ T2334] loop5: detected capacity change from 0 to 1030 10:27:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000007bc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) unshare(0x40020800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fallocate(r0, 0x2c, 0x5, 0x7) bind$inet6(r3, &(0x7f0000000000), 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/2092], 0x82a) 10:27:44 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = signalfd(r0, &(0x7f0000000200), 0x8) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0x2, 0x81, 0x9, 0x3, 0x0, 0x40, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x32b2, 0x1, @perf_config_ext={0x6, 0x2}, 0x10200, 0x401, 0x26, 0x1baab7b2f6d69e19, 0x4, 0xff, 0x6, 0x0, 0x1f, 0x0, 0x10002}, r1, 0x6, 0xffffffffffffffff, 0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2838.030500][ T2334] EXT4-fs (loop5): Invalid log cluster size: 9216 [ 2838.037037][ T2350] loop1: detected capacity change from 0 to 1054 [ 2838.055457][ T2350] EXT4-fs (loop1): Invalid log cluster size: 12630017 10:27:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8060004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001240000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2838.181875][ T2365] loop4: detected capacity change from 0 to 1062 10:27:44 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0xd7}, 0x0, 0x0, r0, 0x0) r1 = epoll_create(0x0) r2 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x44000000) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2838.224488][ T2370] loop1: detected capacity change from 0 to 1054 10:27:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000007cc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) unshare(0x50000300) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2838.276570][ T2370] EXT4-fs (loop1): Invalid log cluster size: 12630273 [ 2838.283451][ T2365] EXT4-fs (loop4): Invalid log block size: 444420 [ 2838.298424][ T2374] loop5: detected capacity change from 0 to 1030 [ 2838.308504][ T2374] EXT4-fs (loop5): Invalid log cluster size: 9217 [ 2838.323597][ T2365] loop4: detected capacity change from 0 to 1062 [ 2838.334094][ T2365] EXT4-fs (loop4): Invalid log block size: 444420 [ 2838.355230][ T2374] loop5: detected capacity change from 0 to 1030 [ 2838.362572][ T2370] loop1: detected capacity change from 0 to 1054 10:27:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000007dc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000070004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2838.381195][ T2370] EXT4-fs (loop1): Invalid log cluster size: 12630273 [ 2838.388249][ T2374] EXT4-fs (loop5): Invalid log cluster size: 9217 10:27:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002240000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000007ec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2838.502483][ T2407] loop4: detected capacity change from 0 to 1062 [ 2838.528411][ T2407] EXT4-fs (loop4): Invalid log block size: 458752 [ 2838.544077][ T2427] loop1: detected capacity change from 0 to 1054 10:27:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000007fc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2838.551341][ T2429] loop5: detected capacity change from 0 to 1030 [ 2838.566798][ T2427] EXT4-fs (loop1): Invalid log cluster size: 12630529 [ 2838.592449][ T2407] loop4: detected capacity change from 0 to 1062 10:27:44 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) unshare(0x40040000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x400240, 0x0) getdents64(r3, &(0x7f0000000200)=""/229, 0xe5) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2838.603324][ T2429] EXT4-fs (loop5): Invalid log cluster size: 9218 [ 2838.612055][ T2407] EXT4-fs (loop4): Invalid log block size: 458752 [ 2838.621420][ T2427] loop1: detected capacity change from 0 to 1054 10:27:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000080c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2838.646113][ T2427] EXT4-fs (loop1): Invalid log cluster size: 12630529 [ 2838.682486][ T2429] loop5: detected capacity change from 0 to 1030 10:27:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8070004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2838.697140][ T2429] EXT4-fs (loop5): Invalid log cluster size: 9218 10:27:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003240000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2838.786519][ T2454] loop1: detected capacity change from 0 to 1054 [ 2838.827387][ T2459] loop4: detected capacity change from 0 to 1062 [ 2838.835031][ T2454] EXT4-fs (loop1): Invalid log cluster size: 12630785 [ 2838.897691][ T2472] loop5: detected capacity change from 0 to 1030 [ 2838.908196][T16645] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2838.909301][ T2459] EXT4-fs (loop4): Invalid log block size: 509956 [ 2838.936813][ T2454] loop1: detected capacity change from 0 to 1054 [ 2838.967403][ T2454] EXT4-fs (loop1): Invalid log cluster size: 12630785 [ 2838.982344][ T2472] EXT4-fs (loop5): Invalid log cluster size: 9219 [ 2838.992444][ T2459] loop4: detected capacity change from 0 to 1062 [ 2839.013371][ T2459] EXT4-fs (loop4): Invalid log block size: 509956 10:27:45 executing program 3: ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f0000001200)={{}, "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"}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fstatfs(r2, &(0x7f0000000200)=""/4096) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000081c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000250000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000ffffee070004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bcc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:45 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x38b9, 0x7, 0x1, 0x0, 0x7, 0x5, 0x9, 0xffff, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000180)={r4, 0x5}, 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x22004851, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000082c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2839.242418][ T2500] loop5: detected capacity change from 0 to 1030 [ 2839.242595][ T2499] loop1: detected capacity change from 0 to 1054 [ 2839.266996][ T2503] loop4: detected capacity change from 0 to 1062 [ 2839.305179][ T2503] EXT4-fs (loop4): Invalid log block size: 519935 [ 2839.319748][ T2500] EXT4-fs (loop5): Invalid log cluster size: 9472 [ 2839.326585][ T2499] EXT4-fs (loop1): Invalid log cluster size: 12631041 [ 2839.404165][ T2499] loop1: detected capacity change from 0 to 1054 [ 2839.411174][ T2500] loop5: detected capacity change from 0 to 1030 [ 2839.418369][ T2503] loop4: detected capacity change from 0 to 1062 [ 2839.441785][ T2503] EXT4-fs (loop4): Invalid log block size: 519935 10:27:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000083c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2839.448304][ T2500] EXT4-fs (loop5): Invalid log cluster size: 9472 [ 2839.455048][ T2499] EXT4-fs (loop1): Invalid log cluster size: 12631041 10:27:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000080004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:45 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x40049409, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bdc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001250000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:45 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000000c0)={0x0, @adiantum}) r2 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000084c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2839.657675][ T2537] loop5: detected capacity change from 0 to 1030 [ 2839.659319][ T2535] loop4: detected capacity change from 0 to 1062 [ 2839.679226][ T2540] loop1: detected capacity change from 0 to 1054 [ 2839.688691][ T2537] EXT4-fs (loop5): Invalid log cluster size: 9473 [ 2839.727442][ T2540] EXT4-fs (loop1): Invalid log cluster size: 12631297 [ 2839.752604][ T2535] EXT4-fs (loop4): Invalid log block size: 524288 10:27:46 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c7c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000085c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2839.771901][ T2537] loop5: detected capacity change from 0 to 1030 [ 2839.787269][ T2537] EXT4-fs (loop5): Invalid log cluster size: 9473 [ 2839.812836][ T2540] loop1: detected capacity change from 0 to 1054 [ 2839.820254][ T2535] loop4: detected capacity change from 0 to 1062 10:27:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002250000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2839.833752][ T2540] EXT4-fs (loop1): Invalid log cluster size: 12631297 [ 2839.840862][ T2535] EXT4-fs (loop4): Invalid log block size: 524288 10:27:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8080004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000086c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2839.922971][ T2567] loop5: detected capacity change from 0 to 1030 10:27:46 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) fcntl$addseals(r2, 0x409, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2839.973532][ T2567] EXT4-fs (loop5): Invalid log cluster size: 9474 [ 2840.003631][ T2573] loop1: detected capacity change from 0 to 1054 [ 2840.010840][ T2574] loop4: detected capacity change from 0 to 1062 10:27:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000087c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2840.037330][ T2574] EXT4-fs (loop4): Invalid log block size: 575492 [ 2840.053367][ T2567] loop5: detected capacity change from 0 to 1030 [ 2840.061419][ T2573] EXT4-fs (loop1): Invalid log cluster size: 12631553 [ 2840.074495][ T2567] EXT4-fs (loop5): Invalid log cluster size: 9474 10:27:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000088c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003250000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2840.124924][ T2573] loop1: detected capacity change from 0 to 1054 [ 2840.124970][ T2574] loop4: detected capacity change from 0 to 1062 [ 2840.150686][ T2573] EXT4-fs (loop1): Invalid log cluster size: 12631553 [ 2840.177145][ T2574] EXT4-fs (loop4): Invalid log block size: 575492 [ 2840.291155][ T2597] loop5: detected capacity change from 0 to 1030 [ 2840.305665][ T2597] EXT4-fs (loop5): Invalid log cluster size: 9475 [ 2840.394666][ T2597] loop5: detected capacity change from 0 to 1030 [ 2840.402972][ T2597] EXT4-fs (loop5): Invalid log cluster size: 9475 10:27:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bfc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000089c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:46 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x100) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x9, @mcast1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000090004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:46 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000260000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001260000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2840.631676][ T2612] loop1: detected capacity change from 0 to 1054 [ 2840.635491][ T2615] loop5: detected capacity change from 0 to 1030 [ 2840.638701][ T2614] loop4: detected capacity change from 0 to 1062 [ 2840.667553][ T2615] EXT4-fs (loop5): Invalid log cluster size: 9728 10:27:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000008ac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2840.709994][ T2612] EXT4-fs (loop1): Invalid log cluster size: 12631809 10:27:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000008bc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2840.756416][ T2614] EXT4-fs (loop4): Invalid log block size: 589824 10:27:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:47 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x100) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x9, @mcast1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8090004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000008cc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2840.831478][ T2627] loop5: detected capacity change from 0 to 1030 [ 2840.856131][ T2627] EXT4-fs (loop5): Invalid log cluster size: 9729 [ 2840.912546][ T2627] loop5: detected capacity change from 0 to 1030 [ 2840.928671][ T2638] loop1: detected capacity change from 0 to 1054 [ 2840.939149][ T2627] EXT4-fs (loop5): Invalid log cluster size: 9729 [ 2840.969050][ T2645] loop4: detected capacity change from 0 to 1062 [ 2840.973563][ T2638] EXT4-fs (loop1): Invalid log cluster size: 12632065 10:27:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002260000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000008dc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:47 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c6a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2841.043793][ T2638] loop1: detected capacity change from 0 to 1054 [ 2841.059088][ T2645] EXT4-fs (loop4): Invalid log block size: 641028 [ 2841.067365][ T2655] loop5: detected capacity change from 0 to 1030 [ 2841.082578][ T2638] EXT4-fs (loop1): Invalid log cluster size: 12632065 [ 2841.127684][ T2655] EXT4-fs (loop5): Invalid log cluster size: 9730 10:27:47 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000a0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000008ec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003260000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:47 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2841.565374][ T2676] loop1: detected capacity change from 0 to 1054 [ 2841.577369][ T2680] loop4: detected capacity change from 0 to 1062 [ 2841.582019][ T2678] loop5: detected capacity change from 0 to 1030 10:27:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000008fc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:48 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xa) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2841.660198][ T2680] EXT4-fs (loop4): Invalid log block size: 655360 [ 2841.661658][ T2676] EXT4-fs (loop1): Invalid log cluster size: 12632321 [ 2841.691356][ T2678] EXT4-fs (loop5): Invalid log cluster size: 9731 10:27:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000090c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c80a0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000270000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2841.772523][ T2676] loop1: detected capacity change from 0 to 1054 [ 2841.798281][ T2676] EXT4-fs (loop1): Invalid log cluster size: 12632321 10:27:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000091c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2841.945337][ T2707] loop4: detected capacity change from 0 to 1062 [ 2841.962827][ T2709] loop5: detected capacity change from 0 to 1030 [ 2841.976147][ T2707] EXT4-fs (loop4): Invalid log block size: 706564 [ 2841.990915][ T2709] EXT4-fs (loop5): Invalid log cluster size: 9984 [ 2842.021038][ T2707] loop4: detected capacity change from 0 to 1062 [ 2842.028780][ T2707] EXT4-fs (loop4): Invalid log block size: 706564 [ 2842.031228][ T2709] loop5: detected capacity change from 0 to 1030 [ 2842.066582][ T2709] EXT4-fs (loop5): Invalid log cluster size: 9984 10:27:48 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:48 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c5f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000092c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c80b0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001270000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2842.511929][ T2727] loop1: detected capacity change from 0 to 1054 [ 2842.515849][ T2732] loop5: detected capacity change from 0 to 1030 [ 2842.522422][ T2731] loop4: detected capacity change from 0 to 1062 10:27:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000093c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2842.555663][ T2727] EXT4-fs (loop1): Invalid log cluster size: 12632577 [ 2842.563434][ T2732] EXT4-fs (loop5): Invalid log cluster size: 9985 [ 2842.593232][ T2731] EXT4-fs (loop4): Invalid log block size: 772100 [ 2842.611786][ T2727] loop1: detected capacity change from 0 to 1054 10:27:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002270000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000c0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:49 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) preadv2(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/206, 0xce}, {&(0x7f00000000c0)=""/12, 0xc}], 0x2, 0x8001, 0x9, 0x10) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2842.656288][ T2727] EXT4-fs (loop1): Invalid log cluster size: 12632577 10:27:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000094c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2842.755397][ T2752] loop5: detected capacity change from 0 to 1030 [ 2842.785812][ T2756] loop4: detected capacity change from 0 to 1062 [ 2842.790091][ T2752] EXT4-fs (loop5): Invalid log cluster size: 9986 [ 2842.803632][ T2757] loop1: detected capacity change from 0 to 1054 [ 2842.812304][ T2757] EXT4-fs (loop1): Invalid log cluster size: 12632833 [ 2842.822221][ T2756] EXT4-fs (loop4): Invalid log block size: 786432 [ 2842.841780][ T2752] loop5: detected capacity change from 0 to 1030 [ 2842.853642][ T2752] EXT4-fs (loop5): Invalid log cluster size: 9986 [ 2842.863437][ T2757] loop1: detected capacity change from 0 to 1054 [ 2842.864420][ T2756] loop4: detected capacity change from 0 to 1062 [ 2842.874794][ T2757] EXT4-fs (loop1): Invalid log cluster size: 12632833 [ 2842.886787][ T2756] EXT4-fs (loop4): Invalid log block size: 786432 10:27:49 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) 10:27:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000095c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:49 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c54, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003270000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000030c0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000096c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2843.435156][ T2780] loop1: detected capacity change from 0 to 1054 [ 2843.444149][ T2782] loop4: detected capacity change from 0 to 1062 [ 2843.446578][ T2784] loop5: detected capacity change from 0 to 1030 [ 2843.484955][ T2784] EXT4-fs (loop5): Invalid log cluster size: 9987 [ 2843.497188][ T2780] EXT4-fs (loop1): Invalid log cluster size: 12633089 [ 2843.507730][ T2782] EXT4-fs (loop4): Invalid log block size: 787200 10:27:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2843.555377][ T2784] loop5: detected capacity change from 0 to 1030 [ 2843.571563][ T2782] loop4: detected capacity change from 0 to 1062 10:27:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000097c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:49 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) [ 2843.596239][ T2784] EXT4-fs (loop5): Invalid log cluster size: 9987 [ 2843.604899][ T2782] EXT4-fs (loop4): Invalid log block size: 787200 10:27:49 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0xc0045878, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c80c0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000280000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2843.667576][ T2803] loop1: detected capacity change from 0 to 1054 [ 2843.704180][ T2803] EXT4-fs (loop1): Invalid log cluster size: 12633345 10:27:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000098c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:50 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) [ 2843.783553][ T2803] loop1: detected capacity change from 0 to 1054 [ 2843.792137][ T2816] loop5: detected capacity change from 0 to 1030 [ 2843.796112][ T2815] loop4: detected capacity change from 0 to 1062 [ 2843.813892][ T2803] EXT4-fs (loop1): Invalid log cluster size: 12633345 10:27:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000099c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:50 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c44, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2843.832745][ T2816] EXT4-fs (loop5): Invalid log cluster size: 10240 [ 2843.859332][ T2815] EXT4-fs (loop4): Invalid log block size: 837636 10:27:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2843.894100][ T2816] loop5: detected capacity change from 0 to 1030 [ 2843.921394][ T2815] loop4: detected capacity change from 0 to 1062 [ 2843.931860][ T2816] EXT4-fs (loop5): Invalid log cluster size: 10240 10:27:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000009ac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2843.941183][ T2815] EXT4-fs (loop4): Invalid log block size: 837636 10:27:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000d0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:50 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001280000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:50 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c44, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2844.023559][ T2844] loop1: detected capacity change from 0 to 1054 10:27:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000009bc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2844.065551][ T2844] EXT4-fs (loop1): Invalid log cluster size: 12633601 [ 2844.128206][ T2855] loop4: detected capacity change from 0 to 1062 [ 2844.146661][ T2854] loop5: detected capacity change from 0 to 1030 10:27:50 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:50 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c44, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002280000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000009cc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2844.181560][ T2854] EXT4-fs (loop5): Invalid log cluster size: 10241 [ 2844.212149][ T2855] EXT4-fs (loop4): Invalid log block size: 851968 10:27:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c80d0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:50 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x400448c9, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2844.268988][ T2865] loop1: detected capacity change from 0 to 1054 [ 2844.310838][ T2871] loop5: detected capacity change from 0 to 1030 [ 2844.332646][ T2871] EXT4-fs (loop5): Invalid log cluster size: 10242 [ 2844.339739][ T2865] EXT4-fs (loop1): Invalid log cluster size: 12633857 10:27:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000009dc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2844.362764][ T2878] loop4: detected capacity change from 0 to 1062 [ 2844.381618][ T2871] loop5: detected capacity change from 0 to 1030 10:27:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000009ec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2844.404000][ T2865] loop1: detected capacity change from 0 to 1054 [ 2844.416793][ T2865] EXT4-fs (loop1): Invalid log cluster size: 12633857 [ 2844.425461][ T2878] EXT4-fs (loop4): Invalid log block size: 903172 [ 2844.428670][ T2871] EXT4-fs (loop5): Invalid log cluster size: 10242 10:27:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003280000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2844.467872][ T2878] loop4: detected capacity change from 0 to 1062 [ 2844.505014][ T2878] EXT4-fs (loop4): Invalid log block size: 903172 10:27:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000009fc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2844.550966][ T2898] loop1: detected capacity change from 0 to 1054 [ 2844.568722][ T2899] loop5: detected capacity change from 0 to 1030 [ 2844.570728][ T2898] EXT4-fs (loop1): Invalid log cluster size: 12634113 [ 2844.594837][ T2899] EXT4-fs (loop5): Invalid log cluster size: 10243 [ 2844.632848][ T2899] loop5: detected capacity change from 0 to 1030 [ 2844.643469][ T2898] loop1: detected capacity change from 0 to 1054 [ 2844.670562][ T2898] EXT4-fs (loop1): Invalid log cluster size: 12634113 [ 2844.677804][ T2899] EXT4-fs (loop5): Invalid log cluster size: 10243 10:27:51 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:51 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c29, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000e0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000a0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000290000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2845.155271][ T2920] loop4: detected capacity change from 0 to 1062 [ 2845.165607][ T2921] loop5: detected capacity change from 0 to 1030 [ 2845.172088][ T2920] EXT4-fs (loop4): Invalid log block size: 917504 [ 2845.191273][ T2926] loop1: detected capacity change from 0 to 1054 10:27:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000a1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2845.202431][ T2921] EXT4-fs (loop5): Invalid log cluster size: 10496 10:27:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c80e0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001290000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2845.242596][ T2926] EXT4-fs (loop1): Invalid log cluster size: 12634369 10:27:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000a2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2845.329199][ T2941] loop4: detected capacity change from 0 to 1062 [ 2845.339710][ T2926] loop1: detected capacity change from 0 to 1054 [ 2845.364050][ T2926] EXT4-fs (loop1): Invalid log cluster size: 12634369 10:27:51 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x8933, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000a3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2845.375906][ T2944] loop5: detected capacity change from 0 to 1030 [ 2845.377970][ T2941] EXT4-fs (loop4): Invalid log block size: 968708 [ 2845.393799][ T2944] EXT4-fs (loop5): Invalid log cluster size: 10497 [ 2845.452043][ T2941] loop4: detected capacity change from 0 to 1062 [ 2845.473098][ T2944] loop5: detected capacity change from 0 to 1030 [ 2845.488197][ T2941] EXT4-fs (loop4): Invalid log block size: 968708 [ 2845.497197][ T2944] EXT4-fs (loop5): Invalid log cluster size: 10497 10:27:52 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001cac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002290000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:52 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c1d, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000f0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000a4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2846.110780][ T2971] loop5: detected capacity change from 0 to 1030 [ 2846.123556][ T2974] loop1: detected capacity change from 0 to 1054 [ 2846.124737][ T2977] loop4: detected capacity change from 0 to 1062 [ 2846.142850][ T2977] EXT4-fs (loop4): Invalid log block size: 983040 10:27:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000a5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2846.166896][ T2971] EXT4-fs (loop5): Invalid log cluster size: 10498 [ 2846.182963][ T2974] EXT4-fs (loop1): Invalid log cluster size: 12634625 10:27:52 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003290000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:52 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x8917, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2846.234851][ T2974] loop1: detected capacity change from 0 to 1054 [ 2846.250736][ T2977] loop4: detected capacity change from 0 to 1062 10:27:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000a6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001cbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2846.281799][ T2974] EXT4-fs (loop1): Invalid log cluster size: 12634625 [ 2846.305876][ T2977] EXT4-fs (loop4): Invalid log block size: 983040 10:27:52 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c80f0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2846.378653][ T2998] loop5: detected capacity change from 0 to 1030 [ 2846.442748][ T2998] EXT4-fs (loop5): Invalid log cluster size: 10499 [ 2846.476457][ T3014] loop1: detected capacity change from 0 to 1054 10:27:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000a7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:52 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c11, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2846.495495][ T3017] loop4: detected capacity change from 0 to 1062 [ 2846.515927][ T3014] EXT4-fs (loop1): Invalid log cluster size: 12634881 [ 2846.528239][ T2998] loop5: detected capacity change from 0 to 1030 [ 2846.538362][ T2998] EXT4-fs (loop5): Invalid log cluster size: 10499 10:27:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000a8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:52 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2846.554686][ T3017] EXT4-fs (loop4): Invalid log block size: 1034244 10:27:52 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x5451, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000002a0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2846.604741][ T3017] loop4: detected capacity change from 0 to 1062 [ 2846.612149][ T3014] loop1: detected capacity change from 0 to 1054 [ 2846.634925][ T3014] EXT4-fs (loop1): Invalid log cluster size: 12634881 [ 2846.645750][ T3017] EXT4-fs (loop4): Invalid log block size: 1034244 10:27:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000a9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000100004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001ccc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2846.774841][ T3053] loop5: detected capacity change from 0 to 1030 [ 2846.808248][ T3058] loop4: detected capacity change from 0 to 1062 [ 2846.817561][ T3053] EXT4-fs (loop5): Invalid log cluster size: 10752 10:27:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000aac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:53 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c82, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2846.823112][ T3059] loop1: detected capacity change from 0 to 1054 [ 2846.857024][ T3058] EXT4-fs (loop4): Invalid log block size: 1048576 [ 2846.862741][ T3059] EXT4-fs (loop1): Invalid log cluster size: 12635137 10:27:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000abc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2846.882879][ T3053] loop5: detected capacity change from 0 to 1030 [ 2846.901872][ T3053] EXT4-fs (loop5): Invalid log cluster size: 10752 [ 2846.913879][ T3059] loop1: detected capacity change from 0 to 1054 [ 2846.922288][ T3058] loop4: detected capacity change from 0 to 1062 10:27:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000012a0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2846.934643][ T3058] EXT4-fs (loop4): Invalid log block size: 1048576 [ 2846.945193][ T3059] EXT4-fs (loop1): Invalid log cluster size: 12635137 10:27:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000acc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8100004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2847.050147][ T3080] loop5: detected capacity change from 0 to 1030 [ 2847.083100][ T3080] EXT4-fs (loop5): Invalid log cluster size: 10753 [ 2847.101678][ T3085] loop4: detected capacity change from 0 to 1062 [ 2847.111374][ T3085] EXT4-fs (loop4): Invalid log block size: 1099780 [ 2847.121652][ T3080] loop5: detected capacity change from 0 to 1030 [ 2847.128874][ T3080] EXT4-fs (loop5): Invalid log cluster size: 10753 [ 2847.150546][ T3085] loop4: detected capacity change from 0 to 1062 [ 2847.158163][ T3085] EXT4-fs (loop4): Invalid log block size: 1099780 10:27:53 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001cdc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:53 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c04, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000adc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000022a0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000110004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2847.533118][ T3103] loop5: detected capacity change from 0 to 1030 [ 2847.538595][ T3102] loop1: detected capacity change from 0 to 1054 [ 2847.554574][ T3105] loop4: detected capacity change from 0 to 1062 [ 2847.564436][ T3103] EXT4-fs (loop5): Invalid log cluster size: 10754 10:27:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000aec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000032a0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2847.591554][ T3102] EXT4-fs (loop1): Invalid log cluster size: 12635393 [ 2847.601738][ T3105] EXT4-fs (loop4): Invalid log block size: 1114112 10:27:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001cec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:54 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2847.684786][ T3105] loop4: detected capacity change from 0 to 1062 [ 2847.699562][ T3105] EXT4-fs (loop4): Invalid log block size: 1114112 10:27:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8110004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001aec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:54 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c00, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2847.804330][ T3126] loop1: detected capacity change from 0 to 1054 [ 2847.805485][ T3125] loop5: detected capacity change from 0 to 1030 [ 2847.851436][ T3125] EXT4-fs (loop5): Invalid log cluster size: 10755 [ 2847.863212][ T3135] loop4: detected capacity change from 0 to 1062 [ 2847.901243][ T3126] EXT4-fs (loop1): Invalid log cluster size: 12635649 [ 2847.913716][ T3135] EXT4-fs (loop4): Invalid log block size: 1165316 10:27:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8120004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000afc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:54 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2847.941991][ T3125] loop5: detected capacity change from 0 to 1030 10:27:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001cfc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:54 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c00, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2847.990264][ T3125] EXT4-fs (loop5): Invalid log cluster size: 10755 10:27:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000002b0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001afc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2848.062257][ T3149] loop4: detected capacity change from 0 to 1062 [ 2848.088131][ T3149] EXT4-fs (loop4): Invalid log block size: 1230852 [ 2848.109119][ T3156] loop1: detected capacity change from 0 to 1054 [ 2848.121503][ T3149] loop4: detected capacity change from 0 to 1062 [ 2848.136746][ T3161] loop5: detected capacity change from 0 to 1030 [ 2848.144344][ T3156] EXT4-fs (loop1): Invalid log cluster size: 12635905 [ 2848.151540][ T3149] EXT4-fs (loop4): Invalid log block size: 1230852 10:27:54 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c00, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000b0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2848.171987][ T3161] EXT4-fs (loop5): Invalid log cluster size: 11008 10:27:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000002130004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:54 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c00, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2848.231708][ T3161] loop5: detected capacity change from 0 to 1030 [ 2848.242763][ T3156] loop1: detected capacity change from 0 to 1054 [ 2848.243962][ T3161] EXT4-fs (loop5): Invalid log cluster size: 11008 10:27:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000012b0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2848.276225][ T3156] EXT4-fs (loop1): Invalid log cluster size: 12635905 10:27:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2848.376528][ T3184] loop4: detected capacity change from 0 to 1062 [ 2848.387183][ T3185] loop5: detected capacity change from 0 to 1030 [ 2848.397773][ T3185] EXT4-fs (loop5): Invalid log cluster size: 11009 [ 2848.406979][ T3184] EXT4-fs (loop4): Invalid log block size: 1245696 [ 2848.422325][ T3192] loop1: detected capacity change from 0 to 1054 [ 2848.431458][ T3185] loop5: detected capacity change from 0 to 1030 [ 2848.433347][ T3192] EXT4-fs (loop1): Invalid log cluster size: 12636161 [ 2848.448671][ T3185] EXT4-fs (loop5): Invalid log cluster size: 11009 [ 2848.457227][ T3184] loop4: detected capacity change from 0 to 1062 [ 2848.464916][ T3184] EXT4-fs (loop4): Invalid log block size: 1245696 [ 2848.481858][ T3192] loop1: detected capacity change from 0 to 1054 [ 2848.491752][ T3192] EXT4-fs (loop1): Invalid log cluster size: 12636161 10:27:55 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003e90000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000b1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000022b0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8130004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:55 executing program 0 (fault-call:9 fault-nth:0): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2848.944090][ T3216] loop1: detected capacity change from 0 to 1054 [ 2848.953608][ T3218] loop4: detected capacity change from 0 to 1062 [ 2848.976261][ T3216] EXT4-fs (loop1): Invalid log cluster size: 12636417 [ 2848.976469][ T3214] loop5: detected capacity change from 0 to 1030 10:27:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2849.025770][ T3222] FAULT_INJECTION: forcing a failure. [ 2849.025770][ T3222] name failslab, interval 1, probability 0, space 0, times 0 [ 2849.042886][ T3218] EXT4-fs (loop4): Invalid log block size: 1296388 [ 2849.079210][ T3214] EXT4-fs (loop5): Invalid log cluster size: 11010 [ 2849.079278][ T3222] CPU: 0 PID: 3222 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2849.095760][ T3222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2849.105801][ T3222] Call Trace: [ 2849.109067][ T3222] dump_stack_lvl+0xcd/0x134 [ 2849.113653][ T3222] should_fail.cold+0x5/0xa [ 2849.118146][ T3222] ? tomoyo_realpath_from_path+0xc3/0x620 [ 2849.123851][ T3222] should_failslab+0x5/0x10 [ 2849.128347][ T3222] __kmalloc+0x72/0x330 [ 2849.132486][ T3222] tomoyo_realpath_from_path+0xc3/0x620 [ 2849.138025][ T3222] ? tomoyo_profile+0x42/0x50 [ 2849.142695][ T3222] tomoyo_path_number_perm+0x1d5/0x590 [ 2849.148142][ T3222] ? tomoyo_path_number_perm+0x18d/0x590 [ 2849.153762][ T3222] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2849.159656][ T3222] ? lock_downgrade+0x6e0/0x6e0 [ 2849.164490][ T3222] ? lock_acquire+0x442/0x510 [ 2849.169153][ T3222] ? lock_release+0x522/0x720 [ 2849.173811][ T3222] ? __context_tracking_exit+0xb8/0xe0 [ 2849.179259][ T3222] ? __fget_files+0x288/0x3d0 [ 2849.184011][ T3222] security_file_ioctl+0x50/0xb0 [ 2849.188939][ T3222] __x64_sys_ioctl+0xb3/0x200 [ 2849.193602][ T3222] do_syscall_64+0x35/0xb0 [ 2849.198005][ T3222] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2849.203889][ T3222] RIP: 0033:0x4665d9 [ 2849.207764][ T3222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:27:55 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2849.227530][ T3222] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2849.235928][ T3222] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2849.244015][ T3222] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2849.251982][ T3222] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2849.259935][ T3222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2849.267891][ T3222] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:27:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8140004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000b2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2849.328536][ T3222] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2849.346044][ T3231] loop1: detected capacity change from 0 to 1054 [ 2849.363237][ T3214] loop5: detected capacity change from 0 to 1030 10:27:55 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2849.383691][ T3214] EXT4-fs (loop5): Invalid log cluster size: 11010 [ 2849.405645][ T3231] EXT4-fs (loop1): Invalid log cluster size: 12636673 [ 2849.417266][ T3241] loop4: detected capacity change from 0 to 1062 10:27:55 executing program 0 (fault-call:9 fault-nth:1): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:27:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000032b0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2849.455708][ T3241] EXT4-fs (loop4): Invalid log block size: 1361924 [ 2849.466953][ T3231] loop1: detected capacity change from 0 to 1054 [ 2849.489521][ T3231] EXT4-fs (loop1): Invalid log cluster size: 12636673 10:27:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000b3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2849.504062][ T3241] loop4: detected capacity change from 0 to 1062 [ 2849.518016][ T3241] EXT4-fs (loop4): Invalid log block size: 1361924 [ 2849.580111][ T3265] loop5: detected capacity change from 0 to 1030 [ 2849.582961][ T3258] FAULT_INJECTION: forcing a failure. [ 2849.582961][ T3258] name failslab, interval 1, probability 0, space 0, times 0 [ 2849.613130][ T3265] EXT4-fs (loop5): Invalid log cluster size: 11011 [ 2849.616251][ T3258] CPU: 0 PID: 3258 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2849.629329][ T3258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2849.639378][ T3258] Call Trace: [ 2849.642649][ T3258] dump_stack_lvl+0xcd/0x134 [ 2849.647249][ T3258] should_fail.cold+0x5/0xa [ 2849.651874][ T3258] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 2849.657333][ T3258] should_failslab+0x5/0x10 [ 2849.661838][ T3258] __kmalloc+0x72/0x330 [ 2849.665996][ T3258] tomoyo_encode2.part.0+0xe9/0x3a0 [ 2849.671376][ T3258] tomoyo_encode+0x28/0x50 [ 2849.675791][ T3258] tomoyo_realpath_from_path+0x186/0x620 [ 2849.681430][ T3258] tomoyo_path_number_perm+0x1d5/0x590 [ 2849.686894][ T3258] ? tomoyo_path_number_perm+0x18d/0x590 [ 2849.692536][ T3258] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2849.698362][ T3258] ? lock_downgrade+0x6e0/0x6e0 [ 2849.703210][ T3258] ? lock_acquire+0x442/0x510 [ 2849.707887][ T3258] ? lock_release+0x522/0x720 [ 2849.712570][ T3258] ? __fget_files+0x288/0x3d0 [ 2849.717250][ T3258] security_file_ioctl+0x50/0xb0 [ 2849.722190][ T3258] __x64_sys_ioctl+0xb3/0x200 10:27:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8150004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2849.726870][ T3258] do_syscall_64+0x35/0xb0 [ 2849.729047][ T3275] loop4: detected capacity change from 0 to 1062 [ 2849.731281][ T3258] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2849.731312][ T3258] RIP: 0033:0x4665d9 [ 2849.731328][ T3258] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2849.731350][ T3258] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 [ 2849.752272][ T3275] EXT4-fs (loop4): Invalid log block size: 1427460 [ 2849.766951][ T3258] ORIG_RAX: 0000000000000010 [ 2849.766962][ T3258] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2849.766978][ T3258] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2849.766991][ T3258] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2849.767004][ T3258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2849.767017][ T3258] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2849.795334][ T3271] loop1: detected capacity change from 0 to 1054 10:27:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000b4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2849.813796][ T3258] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2849.843536][ T3271] EXT4-fs (loop1): Invalid log cluster size: 12636929 [ 2849.865406][ T3265] loop5: detected capacity change from 0 to 1030 [ 2849.872426][ T3275] loop4: detected capacity change from 0 to 1062 10:27:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000b5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2849.890941][ T3271] loop1: detected capacity change from 0 to 1054 [ 2849.909215][ T3271] EXT4-fs (loop1): Invalid log cluster size: 12636929 [ 2849.919473][ T3275] EXT4-fs (loop4): Invalid log block size: 1427460 [ 2849.926297][ T3265] EXT4-fs (loop5): Invalid log cluster size: 11011 10:27:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000002c0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2850.020973][ T3299] loop5: detected capacity change from 0 to 1030 [ 2850.033661][ T3299] EXT4-fs (loop5): Invalid log cluster size: 11264 [ 2850.080935][ T3299] loop5: detected capacity change from 0 to 1030 [ 2850.090531][ T3299] EXT4-fs (loop5): Invalid log cluster size: 11264 10:27:56 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8160004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:56 executing program 0 (fault-call:9 fault-nth:2): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:27:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000012c0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2850.393399][ T3311] loop1: detected capacity change from 0 to 1054 [ 2850.415251][ T3315] loop5: detected capacity change from 0 to 1030 [ 2850.426797][ T3316] loop4: detected capacity change from 0 to 1062 10:27:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000b6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2850.449806][ T3315] EXT4-fs (loop5): Invalid log cluster size: 11265 [ 2850.462296][ T3311] EXT4-fs (loop1): Invalid log cluster size: 12637185 [ 2850.481611][ T3316] EXT4-fs (loop4): Invalid log block size: 1492996 10:27:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000022c0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2850.518963][ T3314] FAULT_INJECTION: forcing a failure. [ 2850.518963][ T3314] name failslab, interval 1, probability 0, space 0, times 0 [ 2850.552286][ T3311] loop1: detected capacity change from 0 to 1054 10:27:56 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2850.563682][ T3316] loop4: detected capacity change from 0 to 1062 [ 2850.568554][ T3311] EXT4-fs (loop1): Invalid log cluster size: 12637185 [ 2850.586157][ T3316] EXT4-fs (loop4): Invalid log block size: 1492996 [ 2850.612335][ T3332] loop5: detected capacity change from 0 to 1030 [ 2850.622028][ T3314] CPU: 0 PID: 3314 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2850.631745][ T3314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2850.641791][ T3314] Call Trace: [ 2850.642540][ T3332] EXT4-fs (loop5): Invalid log cluster size: 11266 [ 2850.645062][ T3314] dump_stack_lvl+0xcd/0x134 [ 2850.645094][ T3314] should_fail.cold+0x5/0xa [ 2850.660785][ T3314] ? loop_add+0x4e/0x8f0 [ 2850.665028][ T3314] should_failslab+0x5/0x10 [ 2850.669747][ T3314] kmem_cache_alloc_trace+0x55/0x3c0 [ 2850.675033][ T3314] ? loop_lookup+0xd8/0x1d0 [ 2850.679542][ T3314] loop_add+0x4e/0x8f0 [ 2850.683612][ T3314] loop_control_ioctl+0x16c/0x480 [ 2850.688637][ T3314] ? loop_lookup+0x1d0/0x1d0 [ 2850.693225][ T3314] ? __fget_files+0x288/0x3d0 [ 2850.697907][ T3314] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2850.704151][ T3314] ? loop_lookup+0x1d0/0x1d0 10:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000b7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2850.708747][ T3314] __x64_sys_ioctl+0x193/0x200 [ 2850.713520][ T3314] do_syscall_64+0x35/0xb0 [ 2850.717941][ T3314] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2850.724015][ T3314] RIP: 0033:0x4665d9 [ 2850.727907][ T3314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2850.747947][ T3314] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 10:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2850.756362][ T3314] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2850.764331][ T3314] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2850.772384][ T3314] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2850.780348][ T3314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2850.788320][ T3314] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:27:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8170004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000b8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:57 executing program 0 (fault-call:9 fault-nth:3): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:27:57 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2850.842852][ T3347] loop1: detected capacity change from 0 to 1054 [ 2850.855773][ T3347] EXT4-fs (loop1): Invalid log cluster size: 12637441 [ 2850.866354][ T3332] loop5: detected capacity change from 0 to 1030 [ 2850.888927][ T3332] EXT4-fs (loop5): Invalid log cluster size: 11266 [ 2850.903729][ T3347] loop1: detected capacity change from 0 to 1054 [ 2850.921727][ T3347] EXT4-fs (loop1): Invalid log cluster size: 12637441 10:27:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000032c0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:57 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2850.958035][ T3360] loop4: detected capacity change from 0 to 1062 [ 2850.977278][ T3357] FAULT_INJECTION: forcing a failure. [ 2850.977278][ T3357] name failslab, interval 1, probability 0, space 0, times 0 [ 2850.995724][ T3360] EXT4-fs (loop4): Invalid log block size: 1558532 [ 2851.025682][ T3357] CPU: 1 PID: 3357 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2851.035421][ T3357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2851.045363][ T3368] loop5: detected capacity change from 0 to 1030 [ 2851.045463][ T3357] Call Trace: [ 2851.045470][ T3357] dump_stack_lvl+0xcd/0x134 [ 2851.059592][ T3357] should_fail.cold+0x5/0xa [ 2851.064095][ T3357] ? blk_mq_realloc_tag_set_tags.part.0+0x81/0x1a0 [ 2851.070593][ T3357] should_failslab+0x5/0x10 [ 2851.075099][ T3357] __kmalloc_node+0x75/0x380 [ 2851.079683][ T3357] ? blk_mq_alloc_tag_set+0x4ff/0xf00 [ 2851.085136][ T3357] blk_mq_realloc_tag_set_tags.part.0+0x81/0x1a0 [ 2851.091453][ T3357] blk_mq_alloc_tag_set+0x632/0xf00 [ 2851.096643][ T3357] loop_add+0x26d/0x8f0 [ 2851.100789][ T3357] loop_control_ioctl+0x16c/0x480 [ 2851.105800][ T3357] ? loop_lookup+0x1d0/0x1d0 [ 2851.110376][ T3357] ? __fget_files+0x288/0x3d0 [ 2851.115041][ T3357] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2851.121354][ T3357] ? loop_lookup+0x1d0/0x1d0 [ 2851.125933][ T3357] __x64_sys_ioctl+0x193/0x200 [ 2851.130862][ T3357] do_syscall_64+0x35/0xb0 [ 2851.135263][ T3357] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2851.141144][ T3357] RIP: 0033:0x4665d9 [ 2851.145030][ T3357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2851.165056][ T3357] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 10:27:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2851.173457][ T3357] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2851.181412][ T3357] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2851.189451][ T3357] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2851.197580][ T3357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2851.205535][ T3357] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000b9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:57 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2851.246972][ T3360] loop4: detected capacity change from 0 to 1062 10:27:57 executing program 0 (fault-call:9 fault-nth:4): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:27:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8180004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2851.293872][ T3360] EXT4-fs (loop4): Invalid log block size: 1558532 [ 2851.308221][ T3374] loop1: detected capacity change from 0 to 1054 10:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001b9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2851.366933][ T3374] EXT4-fs (loop1): Invalid log cluster size: 12637697 [ 2851.386520][ T3368] EXT4-fs (loop5): Invalid log cluster size: 11267 10:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000bac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2851.423645][ T3374] loop1: detected capacity change from 0 to 1054 [ 2851.428099][ T3387] loop4: detected capacity change from 0 to 1062 [ 2851.435146][ T3383] FAULT_INJECTION: forcing a failure. [ 2851.435146][ T3383] name failslab, interval 1, probability 0, space 0, times 0 [ 2851.454351][ T3374] EXT4-fs (loop1): Invalid log cluster size: 12637697 [ 2851.456170][ T3387] EXT4-fs (loop4): Invalid log block size: 1624068 [ 2851.474473][ T3383] CPU: 1 PID: 3383 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2851.475083][ T3368] loop5: detected capacity change from 0 to 1030 [ 2851.484277][ T3383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2851.484290][ T3383] Call Trace: [ 2851.484296][ T3383] dump_stack_lvl+0xcd/0x134 [ 2851.484325][ T3383] should_fail.cold+0x5/0xa [ 2851.484349][ T3383] ? blk_mq_alloc_tag_set+0x415/0xf00 [ 2851.484374][ T3383] should_failslab+0x5/0x10 10:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000bbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2851.484396][ T3383] __kmalloc_node+0x75/0x380 [ 2851.484420][ T3383] blk_mq_alloc_tag_set+0x415/0xf00 [ 2851.484450][ T3383] loop_add+0x26d/0x8f0 [ 2851.502996][ T3368] EXT4-fs (loop5): Invalid log cluster size: 11267 [ 2851.504131][ T3383] loop_control_ioctl+0x16c/0x480 [ 2851.504164][ T3383] ? loop_lookup+0x1d0/0x1d0 [ 2851.553079][ T3383] ? __fget_files+0x288/0x3d0 [ 2851.557771][ T3383] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2851.564018][ T3383] ? loop_lookup+0x1d0/0x1d0 [ 2851.568620][ T3383] __x64_sys_ioctl+0x193/0x200 [ 2851.573649][ T3383] do_syscall_64+0x35/0xb0 [ 2851.578068][ T3383] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2851.583968][ T3383] RIP: 0033:0x4665d9 [ 2851.587857][ T3383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2851.607650][ T3383] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2851.616258][ T3383] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2851.624295][ T3383] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2851.632248][ T3383] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2851.640483][ T3383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2851.648597][ T3383] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:27:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000002d0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:58 executing program 0 (fault-call:9 fault-nth:5): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:27:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2851.723252][ T3387] loop4: detected capacity change from 0 to 1062 [ 2851.749966][ T3387] EXT4-fs (loop4): Invalid log block size: 1624068 [ 2851.780906][ T3407] loop1: detected capacity change from 0 to 1054 [ 2851.785621][ T3408] FAULT_INJECTION: forcing a failure. [ 2851.785621][ T3408] name failslab, interval 1, probability 0, space 0, times 0 [ 2851.811544][ T3408] CPU: 1 PID: 3408 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2851.821447][ T3408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2851.827240][ T3413] loop5: detected capacity change from 0 to 1030 [ 2851.831752][ T3408] Call Trace: [ 2851.831760][ T3408] dump_stack_lvl+0xcd/0x134 [ 2851.831793][ T3408] should_fail.cold+0x5/0xa [ 2851.850483][ T3408] ? blk_mq_init_tags+0x6f/0x2a0 [ 2851.855429][ T3408] should_failslab+0x5/0x10 [ 2851.859937][ T3408] kmem_cache_alloc_node_trace+0x59/0x400 [ 2851.865658][ T3408] blk_mq_init_tags+0x6f/0x2a0 [ 2851.870422][ T3408] blk_mq_alloc_rq_map+0x58/0x1d0 [ 2851.875453][ T3408] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2851.881439][ T3408] blk_mq_alloc_tag_set+0x788/0xf00 [ 2851.886645][ T3408] loop_add+0x26d/0x8f0 [ 2851.890806][ T3408] loop_control_ioctl+0x16c/0x480 [ 2851.895831][ T3408] ? loop_lookup+0x1d0/0x1d0 [ 2851.900420][ T3408] ? __fget_files+0x288/0x3d0 [ 2851.905099][ T3408] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2851.911336][ T3408] ? loop_lookup+0x1d0/0x1d0 [ 2851.915921][ T3408] __x64_sys_ioctl+0x193/0x200 [ 2851.920682][ T3408] do_syscall_64+0x35/0xb0 [ 2851.925093][ T3408] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2851.930987][ T3408] RIP: 0033:0x4665d9 [ 2851.934872][ T3408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2851.954474][ T3408] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2851.962888][ T3408] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2851.970851][ T3408] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 10:27:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000bcc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2851.978813][ T3408] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2851.986776][ T3408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2851.994736][ T3408] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2852.010729][ T3407] EXT4-fs (loop1): Invalid log cluster size: 12637953 [ 2852.019609][ T3413] EXT4-fs (loop5): Invalid log cluster size: 11520 [ 2852.081782][ T3407] loop1: detected capacity change from 0 to 1054 [ 2852.097643][ T3407] EXT4-fs (loop1): Invalid log cluster size: 12637953 [ 2852.120404][ T3408] blk-mq: reduced tag depth (128 -> 64) 10:27:58 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8190004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000012d0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bcc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:58 executing program 0 (fault-call:9 fault-nth:6): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2852.256250][ T3431] loop5: detected capacity change from 0 to 1030 [ 2852.267297][ T3435] loop1: detected capacity change from 0 to 1054 [ 2852.270769][ T3436] loop4: detected capacity change from 0 to 1062 10:27:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000bdc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2852.302334][ T3435] EXT4-fs (loop1): Invalid log cluster size: 12638209 [ 2852.316831][ T3436] EXT4-fs (loop4): Invalid log block size: 1689604 [ 2852.319460][ T3431] EXT4-fs (loop5): Invalid log cluster size: 11521 10:27:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bdc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2852.353534][ T3435] loop1: detected capacity change from 0 to 1054 [ 2852.371955][ T3436] loop4: detected capacity change from 0 to 1062 [ 2852.383666][ T3436] EXT4-fs (loop4): Invalid log block size: 1689604 [ 2852.392496][ T3435] EXT4-fs (loop1): Invalid log cluster size: 12638209 [ 2852.401632][ T3431] loop5: detected capacity change from 0 to 1030 [ 2852.413341][ T3445] FAULT_INJECTION: forcing a failure. [ 2852.413341][ T3445] name failslab, interval 1, probability 0, space 0, times 0 [ 2852.428689][ T3431] EXT4-fs (loop5): Invalid log cluster size: 11521 10:27:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2852.449031][ T3445] CPU: 0 PID: 3445 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2852.458758][ T3445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2852.468806][ T3445] Call Trace: [ 2852.472078][ T3445] dump_stack_lvl+0xcd/0x134 [ 2852.476675][ T3445] should_fail.cold+0x5/0xa [ 2852.481266][ T3445] ? sbitmap_init_node+0x1c3/0x6f0 [ 2852.486378][ T3445] should_failslab+0x5/0x10 [ 2852.490879][ T3445] __kmalloc_node+0x75/0x380 [ 2852.495468][ T3445] sbitmap_init_node+0x1c3/0x6f0 [ 2852.500407][ T3445] sbitmap_queue_init_node+0x3e/0x480 [ 2852.505781][ T3445] ? lockdep_init_map_type+0x2c3/0x7b0 [ 2852.511331][ T3445] blk_mq_init_bitmaps+0x57/0x180 [ 2852.516354][ T3445] blk_mq_init_tags+0x1a2/0x2a0 [ 2852.521199][ T3445] blk_mq_alloc_rq_map+0x58/0x1d0 [ 2852.526229][ T3445] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2852.532216][ T3445] blk_mq_alloc_tag_set+0x788/0xf00 [ 2852.537420][ T3445] loop_add+0x26d/0x8f0 [ 2852.541579][ T3445] loop_control_ioctl+0x16c/0x480 [ 2852.546605][ T3445] ? loop_lookup+0x1d0/0x1d0 [ 2852.551197][ T3445] ? __fget_files+0x288/0x3d0 [ 2852.555878][ T3445] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2852.562113][ T3445] ? loop_lookup+0x1d0/0x1d0 [ 2852.566702][ T3445] __x64_sys_ioctl+0x193/0x200 [ 2852.571466][ T3445] do_syscall_64+0x35/0xb0 [ 2852.575881][ T3445] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2852.581780][ T3445] RIP: 0033:0x4665d9 10:27:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c81a0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2852.585664][ T3445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2852.605271][ T3445] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2852.613676][ T3445] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 2852.621644][ T3445] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2852.629607][ T3445] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 [ 2852.637573][ T3445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2852.645536][ T3445] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 10:27:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000bec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2852.688413][ T3460] loop4: detected capacity change from 0 to 1062 [ 2852.698572][ T3460] EXT4-fs (loop4): Invalid log block size: 1755140 [ 2852.706131][ T3445] blk-mq: reduced tag depth (128 -> 64) 10:27:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000022d0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2852.741591][ T3460] loop4: detected capacity change from 0 to 1062 [ 2852.780018][ T3460] EXT4-fs (loop4): Invalid log block size: 1755140 [ 2852.803827][ T3472] loop1: detected capacity change from 0 to 1054 [ 2852.824228][ T3474] loop5: detected capacity change from 0 to 1030 [ 2852.833822][ T3474] EXT4-fs (loop5): Invalid log cluster size: 11522 [ 2852.847324][ T3472] EXT4-fs (loop1): Invalid log cluster size: 12638465 [ 2852.900153][ T3474] loop5: detected capacity change from 0 to 1030 [ 2852.908805][ T3474] EXT4-fs (loop5): Invalid log cluster size: 11522 10:27:59 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:27:59 executing program 0 (fault-call:9 fault-nth:7): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:27:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c81b0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001dac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000032d0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2853.209233][ T3494] loop5: detected capacity change from 0 to 1030 [ 2853.210771][ T3491] loop4: detected capacity change from 0 to 1062 [ 2853.232807][ T3492] loop1: detected capacity change from 0 to 1054 10:27:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000bfc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2853.259156][ T3494] EXT4-fs (loop5): Invalid log cluster size: 11523 [ 2853.265157][ T3491] EXT4-fs (loop4): Invalid log block size: 1820676 [ 2853.310721][ T3497] FAULT_INJECTION: forcing a failure. [ 2853.310721][ T3497] name failslab, interval 1, probability 0, space 0, times 0 [ 2853.327146][ T3492] EXT4-fs (loop1): Invalid log cluster size: 12638721 [ 2853.347518][ T3497] CPU: 0 PID: 3497 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2853.357248][ T3497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2853.367292][ T3497] Call Trace: [ 2853.370564][ T3497] dump_stack_lvl+0xcd/0x134 [ 2853.375150][ T3497] should_fail.cold+0x5/0xa [ 2853.379641][ T3497] ? sbitmap_queue_init_node+0x1d8/0x480 [ 2853.385261][ T3497] should_failslab+0x5/0x10 [ 2853.389752][ T3497] kmem_cache_alloc_node_trace+0x59/0x400 [ 2853.395457][ T3497] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2853.401685][ T3497] sbitmap_queue_init_node+0x1d8/0x480 [ 2853.407136][ T3497] blk_mq_init_bitmaps+0x57/0x180 [ 2853.412149][ T3497] blk_mq_init_tags+0x1a2/0x2a0 [ 2853.416991][ T3497] blk_mq_alloc_rq_map+0x58/0x1d0 [ 2853.422008][ T3497] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2853.427982][ T3497] blk_mq_alloc_tag_set+0x788/0xf00 [ 2853.433171][ T3497] loop_add+0x26d/0x8f0 [ 2853.437317][ T3497] loop_control_ioctl+0x16c/0x480 [ 2853.442335][ T3497] ? loop_lookup+0x1d0/0x1d0 [ 2853.446935][ T3497] ? __fget_files+0x288/0x3d0 [ 2853.451604][ T3497] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2853.457835][ T3497] ? loop_lookup+0x1d0/0x1d0 [ 2853.462416][ T3497] __x64_sys_ioctl+0x193/0x200 [ 2853.467171][ T3497] do_syscall_64+0x35/0xb0 [ 2853.471574][ T3497] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2853.477462][ T3497] RIP: 0033:0x4665d9 [ 2853.481340][ T3497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2853.500953][ T3497] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 10:27:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000002e0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c81c0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2853.509349][ T3497] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 2853.517307][ T3497] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2853.525266][ T3497] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 [ 2853.533221][ T3497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2853.541173][ T3497] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 10:27:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001bfc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:27:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001dbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2853.660229][ T3510] loop4: detected capacity change from 0 to 1062 [ 2853.663936][ T3511] loop5: detected capacity change from 0 to 1030 [ 2853.685097][ T3510] EXT4-fs (loop4): Invalid log block size: 1886212 [ 2853.698459][ T3518] loop1: detected capacity change from 0 to 1054 10:28:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000c0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2853.705781][ T3511] EXT4-fs (loop5): Invalid log cluster size: 11776 [ 2853.754552][ T3518] EXT4-fs (loop1): Invalid log cluster size: 12638977 [ 2853.816511][ T3497] blk-mq: reduced tag depth (128 -> 64) 10:28:00 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c81d0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000012e0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001dcc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:00 executing program 0 (fault-call:9 fault-nth:8): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2853.945932][ T3538] loop4: detected capacity change from 0 to 1062 [ 2853.946951][ T3541] loop1: detected capacity change from 0 to 1054 [ 2853.955136][ T3542] loop5: detected capacity change from 0 to 1030 10:28:00 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000c1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2853.994651][ T3538] EXT4-fs (loop4): Invalid log block size: 1951748 [ 2853.994832][ T3537] FAULT_INJECTION: forcing a failure. [ 2853.994832][ T3537] name failslab, interval 1, probability 0, space 0, times 0 [ 2854.019039][ T3541] EXT4-fs (loop1): Invalid log cluster size: 12639233 [ 2854.027944][ T3542] EXT4-fs (loop5): Invalid log cluster size: 11777 [ 2854.059143][ T3537] CPU: 0 PID: 3537 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2854.069493][ T3537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2854.079631][ T3537] Call Trace: [ 2854.082905][ T3537] dump_stack_lvl+0xcd/0x134 [ 2854.087677][ T3537] should_fail.cold+0x5/0xa [ 2854.092181][ T3537] ? sbitmap_queue_init_node+0x1d8/0x480 [ 2854.097812][ T3537] should_failslab+0x5/0x10 [ 2854.102319][ T3537] kmem_cache_alloc_node_trace+0x59/0x400 [ 2854.104556][ T3538] loop4: detected capacity change from 0 to 1062 [ 2854.108036][ T3537] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2854.108066][ T3537] sbitmap_queue_init_node+0x1d8/0x480 [ 2854.126016][ T3537] blk_mq_init_bitmaps+0x87/0x180 [ 2854.131042][ T3537] blk_mq_init_tags+0x1a2/0x2a0 [ 2854.136015][ T3537] blk_mq_alloc_rq_map+0x58/0x1d0 [ 2854.136122][ T3538] EXT4-fs (loop4): Invalid log block size: 1951748 [ 2854.141216][ T3537] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2854.141249][ T3537] blk_mq_alloc_tag_set+0x788/0xf00 [ 2854.141279][ T3537] loop_add+0x26d/0x8f0 [ 2854.163099][ T3537] loop_control_ioctl+0x16c/0x480 [ 2854.168132][ T3537] ? loop_lookup+0x1d0/0x1d0 [ 2854.172725][ T3537] ? security_file_ioctl+0x66/0xb0 [ 2854.177838][ T3537] ? __sanitizer_cov_trace_pc+0x43/0x60 [ 2854.183384][ T3537] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2854.189623][ T3537] ? loop_lookup+0x1d0/0x1d0 [ 2854.194219][ T3537] __x64_sys_ioctl+0x193/0x200 [ 2854.198987][ T3537] do_syscall_64+0x35/0xb0 [ 2854.203406][ T3537] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2854.209299][ T3537] RIP: 0033:0x4665d9 [ 2854.213185][ T3537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2854.232793][ T3537] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2854.241200][ T3537] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2854.249341][ T3537] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 10:28:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2854.257305][ T3537] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2854.265267][ T3537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2854.273231][ T3537] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c81e0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2854.304734][ T3541] loop1: detected capacity change from 0 to 1054 [ 2854.313688][ T3542] loop5: detected capacity change from 0 to 1030 [ 2854.323471][ T3542] EXT4-fs (loop5): Invalid log cluster size: 11777 [ 2854.338258][ T3537] blk-mq: reduced tag depth (128 -> 64) [ 2854.341718][ T3541] EXT4-fs (loop1): Invalid log cluster size: 12639233 10:28:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000022e0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000c2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:00 executing program 0 (fault-call:9 fault-nth:9): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001ddc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2854.445669][ T3570] loop4: detected capacity change from 0 to 1062 [ 2854.472896][ T3572] loop5: detected capacity change from 0 to 1030 10:28:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2854.507645][ T3572] EXT4-fs (loop5): Invalid log cluster size: 11778 [ 2854.525684][ T3570] EXT4-fs (loop4): Invalid log block size: 2017284 [ 2854.580941][ T3578] FAULT_INJECTION: forcing a failure. [ 2854.580941][ T3578] name failslab, interval 1, probability 0, space 0, times 0 [ 2854.595851][ T3580] loop1: detected capacity change from 0 to 1054 [ 2854.601964][ T3578] CPU: 1 PID: 3578 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2854.607312][ T3572] loop5: detected capacity change from 0 to 1030 [ 2854.611860][ T3578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2854.611873][ T3578] Call Trace: [ 2854.611880][ T3578] dump_stack_lvl+0xcd/0x134 [ 2854.625918][ T3572] EXT4-fs (loop5): Invalid log cluster size: 11778 [ 2854.628220][ T3578] should_fail.cold+0x5/0xa [ 2854.628246][ T3578] ? blk_mq_alloc_rq_map+0x98/0x1d0 [ 2854.644744][ T3580] EXT4-fs (loop1): Invalid log cluster size: 12639489 [ 2854.647012][ T3578] should_failslab+0x5/0x10 [ 2854.647040][ T3578] __kmalloc_node+0x75/0x380 [ 2854.668067][ T3578] ? blk_mq_init_tags+0x114/0x2a0 [ 2854.673092][ T3578] blk_mq_alloc_rq_map+0x98/0x1d0 [ 2854.678121][ T3578] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2854.684112][ T3578] blk_mq_alloc_tag_set+0x788/0xf00 [ 2854.689315][ T3578] loop_add+0x26d/0x8f0 [ 2854.693463][ T3578] loop_control_ioctl+0x16c/0x480 [ 2854.698480][ T3578] ? loop_lookup+0x1d0/0x1d0 [ 2854.703060][ T3578] ? loop_lookup+0x1d0/0x1d0 [ 2854.707638][ T3578] ? __x64_sys_ioctl+0x118/0x200 [ 2854.712564][ T3578] ? loop_lookup+0x1d0/0x1d0 [ 2854.717229][ T3578] __x64_sys_ioctl+0x193/0x200 [ 2854.721979][ T3578] do_syscall_64+0x35/0xb0 [ 2854.726381][ T3578] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2854.732264][ T3578] RIP: 0033:0x4665d9 [ 2854.736140][ T3578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2854.755992][ T3578] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2854.764478][ T3578] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2854.772437][ T3578] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2854.780391][ T3578] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2854.788606][ T3578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2854.796732][ T3578] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2854.820746][ T3570] loop4: detected capacity change from 0 to 1062 10:28:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000032e0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2854.828313][ T3570] EXT4-fs (loop4): Invalid log block size: 2017284 10:28:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001dec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000c3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:01 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000001f0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2854.877867][ T3578] blk-mq: reduced tag depth (128 -> 64) [ 2854.921520][ T3592] loop1: detected capacity change from 0 to 1054 [ 2854.960255][ T3592] EXT4-fs (loop1): Invalid log cluster size: 12639745 10:28:01 executing program 0 (fault-call:9 fault-nth:10): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2854.973753][ T3604] loop4: detected capacity change from 0 to 1062 [ 2854.984651][ T3604] EXT4-fs (loop4): Invalid log block size: 2031616 [ 2854.989951][ T3607] loop5: detected capacity change from 0 to 1030 [ 2855.003103][ T3607] EXT4-fs (loop5): Invalid log cluster size: 11779 10:28:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000c4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2855.036069][ T3604] loop4: detected capacity change from 0 to 1062 [ 2855.043726][ T3592] loop1: detected capacity change from 0 to 1054 [ 2855.051344][ T3607] loop5: detected capacity change from 0 to 1030 [ 2855.075954][ T3611] FAULT_INJECTION: forcing a failure. 10:28:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2855.075954][ T3611] name failslab, interval 1, probability 0, space 0, times 0 [ 2855.105228][ T3607] EXT4-fs (loop5): Invalid log cluster size: 11779 [ 2855.119696][ T3592] EXT4-fs (loop1): Invalid log cluster size: 12639745 [ 2855.129101][ T3611] CPU: 1 PID: 3611 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2855.135610][ T3604] EXT4-fs (loop4): Invalid log block size: 2031616 [ 2855.138820][ T3611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2855.138833][ T3611] Call Trace: [ 2855.138840][ T3611] dump_stack_lvl+0xcd/0x134 [ 2855.163182][ T3611] should_fail.cold+0x5/0xa [ 2855.167689][ T3611] ? blk_mq_alloc_rq_map+0xd9/0x1d0 [ 2855.172913][ T3611] should_failslab+0x5/0x10 [ 2855.177419][ T3611] __kmalloc_node+0x75/0x380 [ 2855.182011][ T3611] blk_mq_alloc_rq_map+0xd9/0x1d0 10:28:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c81f0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000c5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2855.187040][ T3611] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2855.193031][ T3611] blk_mq_alloc_tag_set+0x788/0xf00 [ 2855.198239][ T3611] loop_add+0x26d/0x8f0 [ 2855.202490][ T3611] loop_control_ioctl+0x16c/0x480 [ 2855.207526][ T3611] ? loop_lookup+0x1d0/0x1d0 [ 2855.212120][ T3611] ? __fget_files+0x288/0x3d0 [ 2855.216798][ T3611] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2855.223039][ T3611] ? loop_lookup+0x1d0/0x1d0 [ 2855.227636][ T3611] __x64_sys_ioctl+0x193/0x200 [ 2855.232404][ T3611] do_syscall_64+0x35/0xb0 10:28:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000200004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2855.236820][ T3611] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2855.242716][ T3611] RIP: 0033:0x4665d9 [ 2855.246606][ T3611] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2855.266389][ T3611] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2855.275065][ T3611] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 10:28:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000002f0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2855.283036][ T3611] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2855.291002][ T3611] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2855.298971][ T3611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2855.306935][ T3611] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000dfc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2855.369045][ T3611] blk-mq: reduced tag depth (128 -> 64) [ 2855.389772][ T3631] loop4: detected capacity change from 0 to 1062 [ 2855.414046][ T3631] EXT4-fs (loop4): Invalid log block size: 2097152 [ 2855.463669][ T3642] loop1: detected capacity change from 0 to 1054 [ 2855.473730][ T3643] loop5: detected capacity change from 0 to 1030 [ 2855.488035][ T3642] EXT4-fs (loop1): Invalid log cluster size: 12640000 [ 2855.498480][ T3643] EXT4-fs (loop5): Invalid log cluster size: 12032 [ 2855.541572][ T3643] loop5: detected capacity change from 0 to 1030 [ 2855.548517][ T3642] loop1: detected capacity change from 0 to 1054 [ 2855.557036][ T3642] EXT4-fs (loop1): Invalid log cluster size: 12640000 [ 2855.571049][ T3643] EXT4-fs (loop5): Invalid log cluster size: 12032 10:28:02 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000c6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:02 executing program 0 (fault-call:9 fault-nth:11): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000010200004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001dfc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000012f0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2855.864340][ T3661] loop5: detected capacity change from 0 to 1030 [ 2855.872786][ T3662] loop4: detected capacity change from 0 to 1062 [ 2855.902041][ T3668] loop1: detected capacity change from 0 to 1054 10:28:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2855.917223][ T3661] EXT4-fs (loop5): Invalid log cluster size: 12033 [ 2855.926108][ T3662] EXT4-fs (loop4): Invalid log block size: 2101248 [ 2855.971119][ T3668] EXT4-fs (loop1): Invalid log cluster size: 12640001 [ 2855.976020][ T3672] FAULT_INJECTION: forcing a failure. [ 2855.976020][ T3672] name fail_page_alloc, interval 1, probability 0, space 0, times 0 10:28:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000022f0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8200004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000c7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2856.041866][ T3668] loop1: detected capacity change from 0 to 1054 [ 2856.044636][ T3672] CPU: 1 PID: 3672 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2856.057988][ T3672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2856.068212][ T3672] Call Trace: [ 2856.071574][ T3672] dump_stack_lvl+0xcd/0x134 [ 2856.076171][ T3672] should_fail.cold+0x5/0xa [ 2856.080679][ T3672] prepare_alloc_pages+0x17b/0x580 [ 2856.085886][ T3672] __alloc_pages+0x12f/0x500 [ 2856.090475][ T3672] ? lock_acquire+0x442/0x510 [ 2856.095153][ T3672] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 2856.102031][ T3672] ? lock_release+0x720/0x720 [ 2856.106703][ T3672] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2856.112947][ T3672] ? __cpu_to_node+0x82/0xb0 [ 2856.117542][ T3672] ? blk_mq_hw_queue_to_node+0xe8/0x140 [ 2856.123092][ T3672] blk_mq_alloc_rqs+0x258/0x7a0 [ 2856.125156][ T3684] loop5: detected capacity change from 0 to 1030 [ 2856.127948][ T3672] __blk_mq_alloc_map_and_request+0x191/0x410 10:28:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2856.127981][ T3672] blk_mq_alloc_tag_set+0x788/0xf00 [ 2856.145515][ T3672] loop_add+0x26d/0x8f0 [ 2856.149677][ T3672] loop_control_ioctl+0x16c/0x480 [ 2856.154708][ T3672] ? loop_lookup+0x1d0/0x1d0 [ 2856.159312][ T3672] ? __fget_files+0x288/0x3d0 [ 2856.163989][ T3672] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2856.170233][ T3672] ? loop_lookup+0x1d0/0x1d0 [ 2856.175001][ T3672] __x64_sys_ioctl+0x193/0x200 [ 2856.176865][ T3668] EXT4-fs (loop1): Invalid log cluster size: 12640001 [ 2856.179765][ T3672] do_syscall_64+0x35/0xb0 10:28:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000c8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2856.179792][ T3672] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2856.179830][ T3672] RIP: 0033:0x4665d9 [ 2856.179847][ T3672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2856.179868][ T3672] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2856.179889][ T3672] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 2856.179905][ T3672] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2856.186687][ T3684] EXT4-fs (loop5): Invalid log cluster size: 12034 [ 2856.191023][ T3672] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 [ 2856.191038][ T3672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2856.191050][ T3672] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 [ 2856.303047][ T3700] loop4: detected capacity change from 0 to 1062 [ 2856.315373][ T3700] EXT4-fs (loop4): Invalid log block size: 2148356 [ 2856.321261][ T3684] loop5: detected capacity change from 0 to 1030 [ 2856.330310][ T3684] EXT4-fs (loop5): Invalid log cluster size: 12034 [ 2856.361467][ T3700] loop4: detected capacity change from 0 to 1062 [ 2856.368999][ T3700] EXT4-fs (loop4): Invalid log block size: 2148356 10:28:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:03 executing program 0 (fault-call:9 fault-nth:12): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8210004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:03 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000032f0000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2856.868783][ T3719] loop5: detected capacity change from 0 to 1030 [ 2856.881398][ T3720] loop1: detected capacity change from 0 to 1054 [ 2856.889242][ T3721] loop4: detected capacity change from 0 to 1062 [ 2856.896986][ T3720] EXT4-fs (loop1): Invalid log cluster size: 12640256 [ 2856.904096][ T3719] EXT4-fs (loop5): Invalid log cluster size: 12035 10:28:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000c9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2856.918653][ T3722] FAULT_INJECTION: forcing a failure. [ 2856.918653][ T3722] name failslab, interval 1, probability 0, space 0, times 0 [ 2856.952655][ T3721] EXT4-fs (loop4): Invalid log block size: 2213892 [ 2856.963341][ T3722] CPU: 0 PID: 3722 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2856.973057][ T3722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2856.983096][ T3722] Call Trace: [ 2856.986359][ T3722] dump_stack_lvl+0xcd/0x134 [ 2856.990941][ T3722] should_fail.cold+0x5/0xa [ 2856.995435][ T3722] should_failslab+0x5/0x10 [ 2857.000022][ T3722] kmem_cache_alloc_node+0x65/0x3e0 [ 2857.005206][ T3722] ? blk_alloc_queue+0x28/0x700 [ 2857.010061][ T3722] blk_alloc_queue+0x28/0x700 [ 2857.014729][ T3722] __blk_mq_alloc_disk+0x47/0x190 [ 2857.019743][ T3722] loop_add+0x2c9/0x8f0 [ 2857.023889][ T3722] loop_control_ioctl+0x16c/0x480 [ 2857.028899][ T3722] ? loop_lookup+0x1d0/0x1d0 [ 2857.033474][ T3722] ? __fget_files+0x288/0x3d0 [ 2857.038146][ T3722] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2857.044369][ T3722] ? loop_lookup+0x1d0/0x1d0 [ 2857.049121][ T3722] __x64_sys_ioctl+0x193/0x200 [ 2857.053873][ T3722] do_syscall_64+0x35/0xb0 [ 2857.058279][ T3722] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2857.064161][ T3722] RIP: 0033:0x4665d9 [ 2857.068035][ T3722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2857.087628][ T3722] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2857.096217][ T3722] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2857.104174][ T3722] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2857.112130][ T3722] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2857.120091][ T3722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2857.128063][ T3722] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000004c8220004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001c9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2857.191421][ T3730] loop1: detected capacity change from 0 to 1054 [ 2857.228301][ T3730] EXT4-fs (loop1): Invalid log cluster size: 12640257 10:28:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000230004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000cac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2857.281043][ T3736] loop4: detected capacity change from 0 to 1062 [ 2857.305637][ T3736] EXT4-fs (loop4): Invalid log block size: 2279428 [ 2857.372738][ T3741] loop1: detected capacity change from 0 to 1054 [ 2857.387040][ T3741] EXT4-fs (loop1): Invalid log cluster size: 12640512 10:28:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001cac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:03 executing program 0 (fault-call:9 fault-nth:13): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2857.440164][ T3747] loop4: detected capacity change from 0 to 1062 [ 2857.463038][ T3719] loop5: detected capacity change from 0 to 1030 [ 2857.487756][ T3747] EXT4-fs (loop4): Invalid log block size: 2293760 [ 2857.503887][ T3719] EXT4-fs (loop5): Invalid log cluster size: 12035 [ 2857.542059][ T3747] loop4: detected capacity change from 0 to 1062 [ 2857.560898][ T3747] EXT4-fs (loop4): Invalid log block size: 2293760 [ 2857.569207][ T3760] loop1: detected capacity change from 0 to 1054 [ 2857.589329][ T3760] EXT4-fs (loop1): Invalid log cluster size: 12640513 [ 2857.629263][ T3757] FAULT_INJECTION: forcing a failure. [ 2857.629263][ T3757] name failslab, interval 1, probability 0, space 0, times 0 [ 2857.644412][ T3757] CPU: 0 PID: 3757 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2857.654132][ T3757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2857.664179][ T3757] Call Trace: [ 2857.667629][ T3757] dump_stack_lvl+0xcd/0x134 [ 2857.672218][ T3757] should_fail.cold+0x5/0xa [ 2857.676706][ T3757] ? mempool_init_node+0x135/0x590 [ 2857.681802][ T3757] should_failslab+0x5/0x10 [ 2857.686287][ T3757] __kmalloc_node+0x75/0x380 [ 2857.690863][ T3757] ? mempool_free_pages+0x20/0x20 [ 2857.695889][ T3757] mempool_init_node+0x135/0x590 [ 2857.700828][ T3757] ? debug_object_destroy+0x210/0x210 [ 2857.706209][ T3757] ? mempool_free_pages+0x20/0x20 [ 2857.711411][ T3757] ? mempool_free+0x3b0/0x3b0 [ 2857.716093][ T3757] mempool_init+0x38/0x50 [ 2857.720427][ T3757] bioset_init+0x338/0x890 [ 2857.724841][ T3757] blk_alloc_queue+0xd9/0x700 10:28:04 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000cbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000300000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000003240004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001cbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2857.729506][ T3757] __blk_mq_alloc_disk+0x47/0x190 [ 2857.734518][ T3757] loop_add+0x2c9/0x8f0 [ 2857.738667][ T3757] loop_control_ioctl+0x16c/0x480 [ 2857.743785][ T3757] ? loop_lookup+0x1d0/0x1d0 [ 2857.748380][ T3757] ? __fget_files+0x288/0x3d0 [ 2857.753062][ T3757] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2857.759304][ T3757] ? loop_lookup+0x1d0/0x1d0 [ 2857.763895][ T3757] __x64_sys_ioctl+0x193/0x200 [ 2857.768663][ T3757] do_syscall_64+0x35/0xb0 [ 2857.773084][ T3757] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2857.778562][ T3772] loop4: detected capacity change from 0 to 1062 [ 2857.778988][ T3757] RIP: 0033:0x4665d9 [ 2857.779005][ T3757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2857.797769][ T3772] EXT4-fs (loop4): Invalid log block size: 2360064 [ 2857.808847][ T3757] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2857.808871][ T3757] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2857.808886][ T3757] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2857.808899][ T3757] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2857.808912][ T3757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2857.808925][ T3757] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2857.828095][ T3775] loop5: detected capacity change from 0 to 1030 10:28:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000ccc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2857.880394][ T3760] loop1: detected capacity change from 0 to 1054 [ 2857.897525][ T3760] EXT4-fs (loop1): Invalid log cluster size: 12640513 [ 2857.906911][ T3775] EXT4-fs (loop5): Invalid log cluster size: 12288 [ 2857.916621][ T3772] loop4: detected capacity change from 0 to 1062 10:28:04 executing program 0 (fault-call:9 fault-nth:14): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001ccc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2857.932102][ T3772] EXT4-fs (loop4): Invalid log block size: 2360064 10:28:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000002e0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2858.012245][ T3775] loop5: detected capacity change from 0 to 1030 [ 2858.026108][ T3775] EXT4-fs (loop5): Invalid log cluster size: 12288 [ 2858.052527][ T3790] FAULT_INJECTION: forcing a failure. [ 2858.052527][ T3790] name failslab, interval 1, probability 0, space 0, times 0 [ 2858.079334][ T3790] CPU: 0 PID: 3790 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2858.089235][ T3790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2858.099379][ T3790] Call Trace: [ 2858.102642][ T3790] dump_stack_lvl+0xcd/0x134 [ 2858.107224][ T3790] should_fail.cold+0x5/0xa [ 2858.111712][ T3790] ? mempool_init_node+0x2e6/0x590 [ 2858.116815][ T3790] ? mempool_init_node+0x2e6/0x590 [ 2858.121914][ T3790] should_failslab+0x5/0x10 [ 2858.126431][ T3790] kmem_cache_alloc+0x5e/0x4a0 [ 2858.131202][ T3790] ? mempool_free_pages+0x20/0x20 [ 2858.136230][ T3790] ? mempool_free_pages+0x20/0x20 [ 2858.141242][ T3790] mempool_init_node+0x2e6/0x590 [ 2858.146171][ T3790] ? mempool_free_pages+0x20/0x20 [ 2858.151181][ T3790] ? mempool_free+0x3b0/0x3b0 [ 2858.155846][ T3790] mempool_init+0x38/0x50 [ 2858.160164][ T3790] bioset_init+0x338/0x890 [ 2858.164573][ T3790] blk_alloc_queue+0xd9/0x700 [ 2858.169239][ T3790] __blk_mq_alloc_disk+0x47/0x190 [ 2858.174344][ T3790] loop_add+0x2c9/0x8f0 [ 2858.178496][ T3790] loop_control_ioctl+0x16c/0x480 [ 2858.183508][ T3790] ? loop_lookup+0x1d0/0x1d0 [ 2858.188087][ T3790] ? loop_lookup+0x1d0/0x1d0 [ 2858.192664][ T3790] ? __x64_sys_ioctl+0x118/0x200 [ 2858.197593][ T3790] ? loop_lookup+0x1d0/0x1d0 [ 2858.202173][ T3790] __x64_sys_ioctl+0x193/0x200 [ 2858.206923][ T3790] do_syscall_64+0x35/0xb0 [ 2858.211325][ T3790] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2858.217208][ T3790] RIP: 0033:0x4665d9 [ 2858.221084][ T3790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2858.240677][ T3790] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2858.249074][ T3790] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2858.257028][ T3790] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2858.264981][ T3790] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2858.272936][ T3790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2858.280894][ T3790] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000cdc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:04 executing program 0 (fault-call:9 fault-nth:15): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2858.299074][ T3795] loop4: detected capacity change from 0 to 1062 [ 2858.312630][ T3795] EXT4-fs (loop4): Invalid log block size: 3014656 [ 2858.328686][ T3797] loop1: detected capacity change from 0 to 1054 [ 2858.351620][ T3795] loop4: detected capacity change from 0 to 1062 [ 2858.364257][ T3795] EXT4-fs (loop4): Invalid log block size: 3014656 [ 2858.414863][ T3805] FAULT_INJECTION: forcing a failure. [ 2858.414863][ T3805] name failslab, interval 1, probability 0, space 0, times 0 [ 2858.439579][ T3797] EXT4-fs (loop1): Invalid log cluster size: 12640768 [ 2858.442908][ T3805] CPU: 1 PID: 3805 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2858.456132][ T3805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2858.466183][ T3805] Call Trace: [ 2858.469454][ T3805] dump_stack_lvl+0xcd/0x134 [ 2858.474058][ T3805] should_fail.cold+0x5/0xa [ 2858.478563][ T3805] ? mempool_init_node+0x2e6/0x590 [ 2858.483678][ T3805] ? mempool_init_node+0x2e6/0x590 [ 2858.488786][ T3805] should_failslab+0x5/0x10 [ 2858.493371][ T3805] kmem_cache_alloc+0x5e/0x4a0 [ 2858.498130][ T3805] ? mempool_free_pages+0x20/0x20 [ 2858.503157][ T3805] ? mempool_free_pages+0x20/0x20 [ 2858.508180][ T3805] mempool_init_node+0x2e6/0x590 [ 2858.513118][ T3805] ? mempool_free_pages+0x20/0x20 [ 2858.518137][ T3805] ? mempool_free+0x3b0/0x3b0 [ 2858.522813][ T3805] mempool_init+0x38/0x50 [ 2858.527143][ T3805] bioset_init+0x338/0x890 [ 2858.531560][ T3805] blk_alloc_queue+0xd9/0x700 [ 2858.536331][ T3805] __blk_mq_alloc_disk+0x47/0x190 [ 2858.541533][ T3805] loop_add+0x2c9/0x8f0 [ 2858.545694][ T3805] loop_control_ioctl+0x16c/0x480 [ 2858.550720][ T3805] ? loop_lookup+0x1d0/0x1d0 [ 2858.555307][ T3805] ? __fget_files+0x288/0x3d0 [ 2858.559980][ T3805] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2858.566562][ T3805] ? loop_lookup+0x1d0/0x1d0 [ 2858.571153][ T3805] __x64_sys_ioctl+0x193/0x200 [ 2858.575915][ T3805] do_syscall_64+0x35/0xb0 [ 2858.580329][ T3805] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2858.586228][ T3805] RIP: 0033:0x4665d9 [ 2858.590114][ T3805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2858.609801][ T3805] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2858.618213][ T3805] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2858.626178][ T3805] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2858.634148][ T3805] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2858.642183][ T3805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2858.650148][ T3805] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:05 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001300000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000360004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001cdc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:05 executing program 0 (fault-call:9 fault-nth:16): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2858.709299][ T3797] loop1: detected capacity change from 0 to 1054 [ 2858.722517][ T3797] EXT4-fs (loop1): Invalid log cluster size: 12640768 [ 2858.763745][ T3815] loop5: detected capacity change from 0 to 1030 [ 2858.776376][ T3817] loop4: detected capacity change from 0 to 1062 [ 2858.798155][ T3815] EXT4-fs (loop5): Invalid log cluster size: 12289 10:28:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000cec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2858.813173][ T3817] EXT4-fs (loop4): Invalid log block size: 3538944 10:28:05 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2858.862724][ T3815] loop5: detected capacity change from 0 to 1030 [ 2858.872713][ T3817] loop4: detected capacity change from 0 to 1062 [ 2858.893692][ T3823] FAULT_INJECTION: forcing a failure. [ 2858.893692][ T3823] name failslab, interval 1, probability 0, space 0, times 0 10:28:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001cec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2858.914174][ T3815] EXT4-fs (loop5): Invalid log cluster size: 12289 [ 2858.921752][ T3817] EXT4-fs (loop4): Invalid log block size: 3538944 [ 2858.936584][ T3823] CPU: 1 PID: 3823 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2858.946398][ T3823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2858.956453][ T3823] Call Trace: [ 2858.959731][ T3823] dump_stack_lvl+0xcd/0x134 [ 2858.964331][ T3823] should_fail.cold+0x5/0xa [ 2858.969013][ T3823] ? bdi_alloc+0x43/0x140 [ 2858.973337][ T3823] should_failslab+0x5/0x10 [ 2858.977842][ T3823] kmem_cache_alloc_node_trace+0x59/0x400 [ 2858.983563][ T3823] bdi_alloc+0x43/0x140 [ 2858.987713][ T3823] blk_alloc_queue+0xfd/0x700 [ 2858.992395][ T3823] __blk_mq_alloc_disk+0x47/0x190 [ 2858.997420][ T3823] loop_add+0x2c9/0x8f0 [ 2859.001584][ T3823] loop_control_ioctl+0x16c/0x480 [ 2859.006613][ T3823] ? loop_lookup+0x1d0/0x1d0 [ 2859.011201][ T3823] ? security_file_ioctl+0x66/0xb0 [ 2859.016312][ T3823] ? __sanitizer_cov_trace_pc+0x7/0x60 [ 2859.021772][ T3823] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2859.028007][ T3823] ? loop_lookup+0x1d0/0x1d0 [ 2859.032590][ T3823] __x64_sys_ioctl+0x193/0x200 [ 2859.037707][ T3823] do_syscall_64+0x35/0xb0 [ 2859.042213][ T3823] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2859.048114][ T3823] RIP: 0033:0x4665d9 10:28:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000cfc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001cfc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2859.052006][ T3823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2859.057807][ T3832] loop1: detected capacity change from 0 to 1054 [ 2859.071697][ T3823] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2859.071721][ T3823] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2859.083145][ T3832] EXT4-fs (loop1): Invalid log cluster size: 12641024 [ 2859.086402][ T3823] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 10:28:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000d0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:05 executing program 0 (fault-call:9 fault-nth:17): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2859.086418][ T3823] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2859.116989][ T3823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2859.124954][ T3823] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2859.169114][ T3832] loop1: detected capacity change from 0 to 1054 10:28:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000003f0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002300000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2859.215570][ T3832] EXT4-fs (loop1): Invalid log cluster size: 12641024 [ 2859.270271][ T3852] FAULT_INJECTION: forcing a failure. [ 2859.270271][ T3852] name failslab, interval 1, probability 0, space 0, times 0 [ 2859.275087][ T3855] loop5: detected capacity change from 0 to 1030 [ 2859.293351][ T3852] CPU: 1 PID: 3852 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2859.303154][ T3852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2859.313194][ T3852] Call Trace: [ 2859.316454][ T3852] dump_stack_lvl+0xcd/0x134 [ 2859.321039][ T3852] should_fail.cold+0x5/0xa [ 2859.325531][ T3852] ? blk_alloc_queue_stats+0x3c/0x110 [ 2859.330888][ T3852] should_failslab+0x5/0x10 [ 2859.335379][ T3852] kmem_cache_alloc_trace+0x55/0x3c0 [ 2859.340650][ T3852] blk_alloc_queue_stats+0x3c/0x110 [ 2859.345830][ T3852] blk_alloc_queue+0x135/0x700 [ 2859.350583][ T3852] __blk_mq_alloc_disk+0x47/0x190 [ 2859.355594][ T3852] loop_add+0x2c9/0x8f0 [ 2859.359741][ T3852] loop_control_ioctl+0x16c/0x480 [ 2859.364754][ T3852] ? loop_lookup+0x1d0/0x1d0 [ 2859.369336][ T3852] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2859.375563][ T3852] ? loop_lookup+0x1d0/0x1d0 [ 2859.380139][ T3852] __x64_sys_ioctl+0x193/0x200 [ 2859.384889][ T3852] do_syscall_64+0x35/0xb0 [ 2859.389294][ T3852] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2859.395176][ T3852] RIP: 0033:0x4665d9 [ 2859.399139][ T3852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:28:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000d1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2859.418729][ T3852] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2859.427125][ T3852] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2859.435079][ T3852] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2859.443031][ T3852] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2859.451161][ T3852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2859.459114][ T3852] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2859.501905][ T3855] EXT4-fs (loop5): Invalid log cluster size: 12290 [ 2859.504302][ T3860] loop4: detected capacity change from 0 to 1062 [ 2859.535182][ T3860] EXT4-fs (loop4): Invalid log block size: 4128768 [ 2859.544578][ T3855] loop5: detected capacity change from 0 to 1030 10:28:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2859.554495][ T3855] EXT4-fs (loop5): Invalid log cluster size: 12290 [ 2859.631063][ T3860] loop4: detected capacity change from 0 to 1062 [ 2859.639022][ T3870] loop1: detected capacity change from 0 to 1054 [ 2859.646321][ T3860] EXT4-fs (loop4): Invalid log block size: 4128768 [ 2859.656351][ T3870] EXT4-fs (loop1): Invalid log cluster size: 12641280 [ 2859.713157][ T3870] loop1: detected capacity change from 0 to 1054 [ 2859.725136][ T3870] EXT4-fs (loop1): Invalid log cluster size: 12641280 10:28:06 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000d2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:06 executing program 0 (fault-call:9 fault-nth:18): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003300000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000400004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2859.864484][ T3890] loop4: detected capacity change from 0 to 1062 [ 2859.865604][ T3889] loop5: detected capacity change from 0 to 1030 [ 2859.892020][ T3885] FAULT_INJECTION: forcing a failure. [ 2859.892020][ T3885] name failslab, interval 1, probability 0, space 0, times 0 [ 2859.896647][ T3890] EXT4-fs (loop4): Invalid log block size: 4194304 10:28:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2859.910978][ T3891] loop1: detected capacity change from 0 to 1054 [ 2859.919148][ T3889] EXT4-fs (loop5): Invalid log cluster size: 12291 [ 2859.936247][ T3891] EXT4-fs (loop1): Invalid log cluster size: 12641536 [ 2859.945483][ T3885] CPU: 0 PID: 3885 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2859.953995][ T3890] loop4: detected capacity change from 0 to 1062 [ 2859.955287][ T3885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2859.955299][ T3885] Call Trace: [ 2859.955306][ T3885] dump_stack_lvl+0xcd/0x134 [ 2859.955336][ T3885] should_fail.cold+0x5/0xa [ 2859.967639][ T3890] EXT4-fs (loop4): Invalid log block size: 4194304 [ 2859.971653][ T3885] ? percpu_ref_init+0xcf/0x3e0 [ 2859.971681][ T3885] should_failslab+0x5/0x10 [ 2859.971704][ T3885] kmem_cache_alloc_trace+0x55/0x3c0 [ 2859.971727][ T3885] ? blk_clear_pm_only+0x80/0x80 [ 2859.971751][ T3885] percpu_ref_init+0xcf/0x3e0 10:28:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000d3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2860.014635][ T3885] blk_alloc_queue+0x4a9/0x700 [ 2860.019410][ T3885] __blk_mq_alloc_disk+0x47/0x190 [ 2860.024445][ T3885] loop_add+0x2c9/0x8f0 [ 2860.028615][ T3885] loop_control_ioctl+0x16c/0x480 [ 2860.033648][ T3885] ? loop_lookup+0x1d0/0x1d0 [ 2860.038788][ T3885] ? __fget_files+0x288/0x3d0 [ 2860.043599][ T3885] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2860.049845][ T3885] ? loop_lookup+0x1d0/0x1d0 [ 2860.054443][ T3885] __x64_sys_ioctl+0x193/0x200 [ 2860.059216][ T3885] do_syscall_64+0x35/0xb0 10:28:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000d4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2860.063636][ T3885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2860.069540][ T3885] RIP: 0033:0x4665d9 [ 2860.073427][ T3885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2860.093039][ T3885] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2860.101452][ T3885] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 10:28:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000d5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2860.109429][ T3885] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2860.117401][ T3885] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2860.125371][ T3885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2860.133337][ T3885] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:06 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000480004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:06 executing program 0 (fault-call:9 fault-nth:19): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2860.174973][ T3891] loop1: detected capacity change from 0 to 1054 [ 2860.182712][ T3889] loop5: detected capacity change from 0 to 1030 [ 2860.189717][ T3891] EXT4-fs (loop1): Invalid log cluster size: 12641536 [ 2860.204407][ T3889] EXT4-fs (loop5): Invalid log cluster size: 12291 10:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000310000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2860.254868][ T3922] loop4: detected capacity change from 0 to 1062 10:28:06 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000d6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2860.315234][ T3924] FAULT_INJECTION: forcing a failure. [ 2860.315234][ T3924] name failslab, interval 1, probability 0, space 0, times 0 [ 2860.330348][ T3922] EXT4-fs (loop4): Invalid log block size: 4718592 [ 2860.359989][ T3931] loop5: detected capacity change from 0 to 1030 [ 2860.370709][ T3924] CPU: 1 PID: 3924 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2860.380516][ T3924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2860.390557][ T3924] Call Trace: [ 2860.393817][ T3924] dump_stack_lvl+0xcd/0x134 [ 2860.398401][ T3924] should_fail.cold+0x5/0xa [ 2860.402892][ T3924] ? blkg_alloc+0x87/0x670 [ 2860.407292][ T3924] should_failslab+0x5/0x10 [ 2860.411782][ T3924] kmem_cache_alloc_node_trace+0x59/0x400 [ 2860.417492][ T3924] blkg_alloc+0x87/0x670 [ 2860.421726][ T3924] blkcg_init_queue+0x24/0x770 [ 2860.426483][ T3924] blk_alloc_queue+0x4cd/0x700 [ 2860.431240][ T3924] __blk_mq_alloc_disk+0x47/0x190 [ 2860.436252][ T3924] loop_add+0x2c9/0x8f0 [ 2860.440397][ T3924] loop_control_ioctl+0x16c/0x480 [ 2860.445409][ T3924] ? loop_lookup+0x1d0/0x1d0 [ 2860.449986][ T3924] ? __sanitizer_cov_trace_const_cmp2+0x80/0x80 [ 2860.456212][ T3924] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2860.462438][ T3924] ? loop_lookup+0x1d0/0x1d0 [ 2860.467016][ T3924] __x64_sys_ioctl+0x193/0x200 [ 2860.471769][ T3924] do_syscall_64+0x35/0xb0 [ 2860.476170][ T3924] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2860.482057][ T3924] RIP: 0033:0x4665d9 [ 2860.485936][ T3924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2860.505535][ T3924] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2860.513930][ T3924] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2860.521889][ T3924] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2860.529840][ T3924] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2860.537792][ T3924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2860.545746][ T3924] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2860.571427][ T3922] loop4: detected capacity change from 0 to 1062 [ 2860.589282][ T3922] EXT4-fs (loop4): Invalid log block size: 4718592 [ 2860.605826][ T3938] loop1: detected capacity change from 0 to 1054 [ 2860.635732][ T3931] EXT4-fs (loop5): Invalid log cluster size: 12544 10:28:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000004a0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:07 executing program 0 (fault-call:9 fault-nth:20): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000d7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2860.704447][ T3938] EXT4-fs (loop1): Invalid log cluster size: 12641792 [ 2860.734076][ T3931] loop5: detected capacity change from 0 to 1030 [ 2860.743758][ T3931] EXT4-fs (loop5): Invalid log cluster size: 12544 [ 2860.787471][ T3952] loop4: detected capacity change from 0 to 1062 [ 2860.787939][ T3950] FAULT_INJECTION: forcing a failure. [ 2860.787939][ T3950] name failslab, interval 1, probability 0, space 0, times 0 [ 2860.823269][ T3938] loop1: detected capacity change from 0 to 1054 [ 2860.833702][ T3950] CPU: 1 PID: 3950 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2860.843420][ T3950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2860.853470][ T3950] Call Trace: [ 2860.856739][ T3950] dump_stack_lvl+0xcd/0x134 [ 2860.861327][ T3950] should_fail.cold+0x5/0xa [ 2860.865834][ T3950] ? percpu_ref_init+0xcf/0x3e0 [ 2860.870775][ T3950] should_failslab+0x5/0x10 [ 2860.875278][ T3950] kmem_cache_alloc_trace+0x55/0x3c0 [ 2860.880565][ T3950] ? blkg_async_bio_workfn+0x2b0/0x2b0 [ 2860.886024][ T3950] percpu_ref_init+0xcf/0x3e0 [ 2860.890706][ T3950] blkg_alloc+0xb3/0x670 [ 2860.894949][ T3950] blkcg_init_queue+0x24/0x770 [ 2860.899719][ T3950] blk_alloc_queue+0x4cd/0x700 [ 2860.904485][ T3950] __blk_mq_alloc_disk+0x47/0x190 [ 2860.909510][ T3950] loop_add+0x2c9/0x8f0 [ 2860.913671][ T3950] loop_control_ioctl+0x16c/0x480 [ 2860.918861][ T3950] ? loop_lookup+0x1d0/0x1d0 [ 2860.923628][ T3950] ? __fget_files+0x288/0x3d0 [ 2860.928306][ T3950] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2860.934546][ T3950] ? loop_lookup+0x1d0/0x1d0 [ 2860.939135][ T3950] __x64_sys_ioctl+0x193/0x200 [ 2860.943900][ T3950] do_syscall_64+0x35/0xb0 [ 2860.948319][ T3950] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2860.954217][ T3950] RIP: 0033:0x4665d9 [ 2860.958103][ T3950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2860.977704][ T3950] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 10:28:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001310000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2860.986114][ T3950] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2860.994081][ T3950] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2861.002047][ T3950] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2861.010009][ T3950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2861.017973][ T3950] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:07 executing program 0 (fault-call:9 fault-nth:21): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2861.042381][ T3952] EXT4-fs (loop4): Invalid log block size: 4849664 [ 2861.048941][ T3938] EXT4-fs (loop1): Invalid log cluster size: 12641792 10:28:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2861.102470][ T3964] loop5: detected capacity change from 0 to 1030 [ 2861.118336][ T3952] loop4: detected capacity change from 0 to 1062 [ 2861.128698][ T3964] EXT4-fs (loop5): Invalid log cluster size: 12545 [ 2861.130573][ T3952] EXT4-fs (loop4): Invalid log block size: 4849664 10:28:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000d8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2861.163888][ T3964] loop5: detected capacity change from 0 to 1030 [ 2861.178538][ T3967] FAULT_INJECTION: forcing a failure. [ 2861.178538][ T3967] name failslab, interval 1, probability 0, space 0, times 0 [ 2861.184627][ T3964] EXT4-fs (loop5): Invalid log cluster size: 12545 10:28:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2861.206855][ T3967] CPU: 0 PID: 3967 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2861.216575][ T3967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2861.226711][ T3967] Call Trace: [ 2861.229980][ T3967] dump_stack_lvl+0xcd/0x134 [ 2861.234577][ T3967] should_fail.cold+0x5/0xa [ 2861.239080][ T3967] ? blk_iolatency_init+0x4b/0x380 [ 2861.244184][ T3967] should_failslab+0x5/0x10 [ 2861.248689][ T3967] kmem_cache_alloc_trace+0x55/0x3c0 [ 2861.253975][ T3967] blk_iolatency_init+0x4b/0x380 [ 2861.258914][ T3967] blkcg_init_queue+0x158/0x770 [ 2861.263762][ T3967] blk_alloc_queue+0x4cd/0x700 [ 2861.268527][ T3967] __blk_mq_alloc_disk+0x47/0x190 [ 2861.273555][ T3967] loop_add+0x2c9/0x8f0 [ 2861.277709][ T3967] ? loop_control_ioctl+0x15f/0x480 [ 2861.282905][ T3967] loop_control_ioctl+0x16c/0x480 [ 2861.285991][ T3977] loop1: detected capacity change from 0 to 1054 [ 2861.287929][ T3967] ? loop_lookup+0x1d0/0x1d0 [ 2861.287954][ T3967] ? __fget_files+0x288/0x3d0 [ 2861.287979][ T3967] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2861.299027][ T3977] EXT4-fs (loop1): Invalid log cluster size: 12642048 [ 2861.303570][ T3967] ? loop_lookup+0x1d0/0x1d0 [ 2861.303599][ T3967] __x64_sys_ioctl+0x193/0x200 [ 2861.303624][ T3967] do_syscall_64+0x35/0xb0 [ 2861.303647][ T3967] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2861.303677][ T3967] RIP: 0033:0x4665d9 [ 2861.303694][ T3967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2861.359614][ T3967] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2861.368009][ T3967] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2861.375960][ T3967] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2861.383913][ T3967] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2861.391869][ T3967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2861.399830][ T3967] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:07 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000d9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:07 executing program 0 (fault-call:9 fault-nth:22): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000004c0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002310000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2861.493184][ T3977] loop1: detected capacity change from 0 to 1054 [ 2861.509345][ T3977] EXT4-fs (loop1): Invalid log cluster size: 12642048 [ 2861.534044][ T3994] loop4: detected capacity change from 0 to 1062 [ 2861.551641][ T3996] loop5: detected capacity change from 0 to 1030 [ 2861.562893][ T3994] EXT4-fs (loop4): Invalid log block size: 4980736 [ 2861.576992][ T3996] EXT4-fs (loop5): Invalid log cluster size: 12546 10:28:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001d9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2861.580496][ T3995] FAULT_INJECTION: forcing a failure. [ 2861.580496][ T3995] name failslab, interval 1, probability 0, space 0, times 0 [ 2861.596302][ T3995] CPU: 0 PID: 3995 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2861.606018][ T3995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2861.616066][ T3995] Call Trace: [ 2861.619342][ T3995] dump_stack_lvl+0xcd/0x134 [ 2861.623936][ T3995] should_fail.cold+0x5/0xa [ 2861.628436][ T3995] ? lock_downgrade+0x6e0/0x6e0 10:28:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000dac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2861.633293][ T3995] ? iolatency_pd_alloc+0xb8/0x1b0 [ 2861.638407][ T3995] should_failslab+0x5/0x10 [ 2861.642918][ T3995] kmem_cache_alloc_node_trace+0x59/0x400 [ 2861.648635][ T3995] ? rwlock_bug.part.0+0x90/0x90 [ 2861.653572][ T3995] iolatency_pd_alloc+0xb8/0x1b0 [ 2861.658509][ T3995] ? iolat_acquire_inflight+0x50/0x50 [ 2861.663974][ T3995] blkcg_activate_policy+0x232/0xba0 [ 2861.669267][ T3995] blk_iolatency_init+0x1aa/0x380 [ 2861.674380][ T3995] blkcg_init_queue+0x158/0x770 [ 2861.679231][ T3995] blk_alloc_queue+0x4cd/0x700 [ 2861.684003][ T3995] __blk_mq_alloc_disk+0x47/0x190 [ 2861.689030][ T3995] loop_add+0x2c9/0x8f0 [ 2861.693189][ T3995] loop_control_ioctl+0x16c/0x480 [ 2861.698218][ T3995] ? loop_lookup+0x1d0/0x1d0 [ 2861.702916][ T3995] ? __fget_files+0x288/0x3d0 [ 2861.707609][ T3995] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2861.713857][ T3995] ? loop_lookup+0x1d0/0x1d0 [ 2861.718451][ T3995] __x64_sys_ioctl+0x193/0x200 [ 2861.723225][ T3995] do_syscall_64+0x35/0xb0 [ 2861.727646][ T3995] entry_SYSCALL_64_after_hwframe+0x44/0xae 10:28:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2861.733544][ T3995] RIP: 0033:0x4665d9 [ 2861.737437][ T3995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2861.757086][ T3995] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2861.765500][ T3995] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2861.766443][ T4007] loop1: detected capacity change from 0 to 1054 10:28:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001dac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2861.773464][ T3995] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2861.773485][ T3995] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2861.773499][ T3995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2861.773512][ T3995] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2861.822111][ T4007] EXT4-fs (loop1): Invalid log cluster size: 12642304 [ 2861.852338][ T3994] loop4: detected capacity change from 0 to 1062 [ 2861.854015][ T3996] loop5: detected capacity change from 0 to 1030 [ 2861.864386][ T3994] EXT4-fs (loop4): Invalid log block size: 4980736 10:28:08 executing program 0 (fault-call:9 fault-nth:23): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:08 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000dbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000002520004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2861.904323][ T3996] EXT4-fs (loop5): Invalid log cluster size: 12546 [ 2861.915401][ T4007] loop1: detected capacity change from 0 to 1054 [ 2861.941911][ T4007] EXT4-fs (loop1): Invalid log cluster size: 12642304 10:28:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003310000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2862.046112][ T4034] FAULT_INJECTION: forcing a failure. [ 2862.046112][ T4034] name failslab, interval 1, probability 0, space 0, times 0 [ 2862.061461][ T4041] loop5: detected capacity change from 0 to 1030 [ 2862.085067][ T4041] EXT4-fs (loop5): Invalid log cluster size: 12547 [ 2862.085375][ T4049] loop4: detected capacity change from 0 to 1062 [ 2862.095615][ T4050] loop1: detected capacity change from 0 to 1054 [ 2862.100350][ T4034] CPU: 0 PID: 4034 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2862.114049][ T4034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2862.124102][ T4034] Call Trace: [ 2862.124201][ T4050] EXT4-fs (loop1): Invalid log cluster size: 12642560 [ 2862.127369][ T4034] dump_stack_lvl+0xcd/0x134 [ 2862.127398][ T4034] should_fail.cold+0x5/0xa [ 2862.143172][ T4034] ? blk_throtl_init+0x7c/0x660 [ 2862.148024][ T4034] should_failslab+0x5/0x10 [ 2862.152412][ T4049] EXT4-fs (loop4): Invalid log block size: 5374464 [ 2862.152555][ T4034] kmem_cache_alloc_node_trace+0x59/0x400 [ 2862.164892][ T4034] ? init_timer_key+0x150/0x340 [ 2862.169752][ T4034] blk_throtl_init+0x7c/0x660 [ 2862.174434][ T4034] blkcg_init_queue+0x268/0x770 [ 2862.179592][ T4034] blk_alloc_queue+0x4cd/0x700 [ 2862.184366][ T4034] __blk_mq_alloc_disk+0x47/0x190 [ 2862.189397][ T4034] loop_add+0x2c9/0x8f0 [ 2862.193561][ T4034] loop_control_ioctl+0x16c/0x480 [ 2862.198578][ T4034] ? loop_lookup+0x1d0/0x1d0 [ 2862.203155][ T4034] ? __fget_files+0x288/0x3d0 [ 2862.207824][ T4034] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2862.214055][ T4034] ? loop_lookup+0x1d0/0x1d0 [ 2862.218635][ T4034] __x64_sys_ioctl+0x193/0x200 [ 2862.223391][ T4034] do_syscall_64+0x35/0xb0 [ 2862.227952][ T4034] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2862.233855][ T4034] RIP: 0033:0x4665d9 [ 2862.237733][ T4034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2862.257499][ T4034] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2862.265988][ T4034] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2862.273945][ T4034] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2862.281901][ T4034] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 10:28:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001dbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2862.289858][ T4034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2862.297987][ T4034] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:08 executing program 0 (fault-call:9 fault-nth:24): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:08 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000dcc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2862.377575][ T4049] loop4: detected capacity change from 0 to 1062 [ 2862.391727][ T4050] loop1: detected capacity change from 0 to 1054 [ 2862.398636][ T4041] loop5: detected capacity change from 0 to 1030 [ 2862.420280][ T4050] EXT4-fs (loop1): Invalid log cluster size: 12642560 10:28:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000eac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2862.420397][ T4049] EXT4-fs (loop4): Invalid log block size: 5374464 [ 2862.437195][ T4041] EXT4-fs (loop5): Invalid log cluster size: 12547 10:28:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000320000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001dcc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2862.549721][ T4072] FAULT_INJECTION: forcing a failure. [ 2862.549721][ T4072] name failslab, interval 1, probability 0, space 0, times 0 [ 2862.562332][ T4072] CPU: 0 PID: 4072 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2862.567875][ T4083] loop5: detected capacity change from 0 to 1030 [ 2862.572131][ T4072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2862.572144][ T4072] Call Trace: [ 2862.572151][ T4072] dump_stack_lvl+0xcd/0x134 10:28:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000ddc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2862.572181][ T4072] should_fail.cold+0x5/0xa [ 2862.572203][ T4072] ? throtl_pd_alloc+0xbb/0xa80 [ 2862.592548][ T4083] EXT4-fs (loop5): Invalid log cluster size: 12800 [ 2862.596462][ T4072] should_failslab+0x5/0x10 [ 2862.596489][ T4072] kmem_cache_alloc_node_trace+0x59/0x400 [ 2862.622814][ T4072] ? rwlock_bug.part.0+0x90/0x90 [ 2862.624094][ T4086] loop1: detected capacity change from 0 to 1054 [ 2862.627759][ T4072] ? throtl_pd_free+0x40/0x40 [ 2862.627785][ T4072] throtl_pd_alloc+0xbb/0xa80 [ 2862.627804][ T4072] ? throtl_pd_free+0x40/0x40 10:28:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001ddc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2862.627822][ T4072] blkcg_activate_policy+0x232/0xba0 [ 2862.627846][ T4072] blk_throtl_init+0x43d/0x660 [ 2862.627870][ T4072] blkcg_init_queue+0x268/0x770 [ 2862.627891][ T4072] blk_alloc_queue+0x4cd/0x700 [ 2862.627919][ T4072] __blk_mq_alloc_disk+0x47/0x190 [ 2862.627947][ T4072] loop_add+0x2c9/0x8f0 [ 2862.627981][ T4072] loop_control_ioctl+0x16c/0x480 [ 2862.637372][ T4086] EXT4-fs (loop1): Invalid log cluster size: 12642816 [ 2862.638948][ T4072] ? loop_lookup+0x1d0/0x1d0 [ 2862.693916][ T4072] ? __fget_files+0x288/0x3d0 [ 2862.698608][ T4072] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2862.704852][ T4072] ? loop_lookup+0x1d0/0x1d0 [ 2862.709448][ T4072] __x64_sys_ioctl+0x193/0x200 [ 2862.714206][ T4072] do_syscall_64+0x35/0xb0 [ 2862.718607][ T4072] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2862.724573][ T4072] RIP: 0033:0x4665d9 [ 2862.728448][ T4072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:28:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000001580004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000dec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2862.748037][ T4072] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2862.756429][ T4072] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2862.764381][ T4072] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2862.772356][ T4072] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2862.780309][ T4072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2862.788359][ T4072] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001dec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2862.814292][ T4086] loop1: detected capacity change from 0 to 1054 [ 2862.814292][ T4083] loop5: detected capacity change from 0 to 1030 [ 2862.830272][ T4083] EXT4-fs (loop5): Invalid log cluster size: 12800 10:28:09 executing program 0 (fault-call:9 fault-nth:25): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2862.855694][ T4086] EXT4-fs (loop1): Invalid log cluster size: 12642816 10:28:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000dfc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2862.931189][ T4109] loop4: detected capacity change from 0 to 1062 [ 2862.967957][ T4109] EXT4-fs (loop4): Invalid log block size: 5767424 [ 2863.003462][ T4109] loop4: detected capacity change from 0 to 1062 [ 2863.022249][ T4109] EXT4-fs (loop4): Invalid log block size: 5767424 [ 2863.096108][ T4124] FAULT_INJECTION: forcing a failure. [ 2863.096108][ T4124] name failslab, interval 1, probability 0, space 0, times 0 [ 2863.113565][ T4124] CPU: 1 PID: 4124 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2863.123726][ T4124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2863.133865][ T4124] Call Trace: [ 2863.137148][ T4124] dump_stack_lvl+0xcd/0x134 [ 2863.141746][ T4124] should_fail.cold+0x5/0xa [ 2863.146250][ T4124] ? blk_stat_alloc_callback+0x54/0x290 [ 2863.151793][ T4124] should_failslab+0x5/0x10 [ 2863.156303][ T4124] kmem_cache_alloc_trace+0x55/0x3c0 [ 2863.161681][ T4124] ? blk_mq_delay_kick_requeue_list+0x30/0x30 [ 2863.167836][ T4124] ? blk_mq_has_request+0xb0/0xb0 [ 2863.172945][ T4124] blk_stat_alloc_callback+0x54/0x290 [ 2863.178324][ T4124] blk_mq_init_allocated_queue+0x89/0x1400 [ 2863.184139][ T4124] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2863.190550][ T4124] ? blk_queue_dma_alignment+0xc/0x50 [ 2863.195919][ T4124] ? blk_set_default_limits+0x9/0x620 [ 2863.201379][ T4124] ? blk_alloc_queue+0x533/0x700 [ 2863.206324][ T4124] __blk_mq_alloc_disk+0x86/0x190 [ 2863.211440][ T4124] loop_add+0x2c9/0x8f0 [ 2863.215954][ T4124] loop_control_ioctl+0x16c/0x480 [ 2863.220982][ T4124] ? loop_lookup+0x1d0/0x1d0 [ 2863.225566][ T4124] ? __fget_files+0x288/0x3d0 [ 2863.230237][ T4124] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2863.236480][ T4124] ? loop_lookup+0x1d0/0x1d0 [ 2863.241072][ T4124] __x64_sys_ioctl+0x193/0x200 [ 2863.245839][ T4124] do_syscall_64+0x35/0xb0 [ 2863.250260][ T4124] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2863.256165][ T4124] RIP: 0033:0x4665d9 [ 2863.260050][ T4124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2863.279874][ T4124] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2863.288457][ T4124] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 10:28:09 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000ebc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001320000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001dfc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000005c0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:09 executing program 0 (fault-call:9 fault-nth:26): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2863.296426][ T4124] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2863.304483][ T4124] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 [ 2863.312451][ T4124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2863.320508][ T4124] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 [ 2863.398817][ T4141] loop4: detected capacity change from 0 to 1062 [ 2863.409048][ T4147] loop1: detected capacity change from 0 to 1054 [ 2863.420288][ T4148] loop5: detected capacity change from 0 to 1030 10:28:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:09 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2863.444708][ T4147] EXT4-fs (loop1): Invalid log cluster size: 12643072 [ 2863.445174][ T4141] EXT4-fs (loop4): Invalid log block size: 6029312 [ 2863.466405][ T4148] EXT4-fs (loop5): Invalid log cluster size: 12801 [ 2863.479066][ T4149] FAULT_INJECTION: forcing a failure. [ 2863.479066][ T4149] name failslab, interval 1, probability 0, space 0, times 0 [ 2863.511540][ T4149] CPU: 1 PID: 4149 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2863.521275][ T4149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2863.521608][ T4147] loop1: detected capacity change from 0 to 1054 [ 2863.531324][ T4149] Call Trace: [ 2863.531331][ T4149] dump_stack_lvl+0xcd/0x134 [ 2863.531362][ T4149] should_fail.cold+0x5/0xa [ 2863.545503][ T4147] EXT4-fs (loop1): Invalid log cluster size: 12643072 [ 2863.549967][ T4149] ? blk_mq_delay_kick_requeue_list+0x30/0x30 [ 2863.549999][ T4149] ? blk_mq_delay_kick_requeue_list+0x30/0x30 [ 2863.550022][ T4149] ? blk_stat_alloc_callback+0x81/0x290 [ 2863.550041][ T4149] should_failslab+0x5/0x10 [ 2863.550061][ T4149] __kmalloc+0x72/0x330 [ 2863.550082][ T4149] ? blk_mq_delay_kick_requeue_list+0x30/0x30 [ 2863.550106][ T4149] ? blk_mq_has_request+0xb0/0xb0 [ 2863.550129][ T4149] blk_stat_alloc_callback+0x81/0x290 [ 2863.550153][ T4149] blk_mq_init_allocated_queue+0x89/0x1400 [ 2863.550182][ T4149] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 10:28:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2863.550206][ T4149] ? blk_queue_dma_alignment+0xc/0x50 [ 2863.550227][ T4149] ? blk_set_default_limits+0x9/0x620 [ 2863.550249][ T4149] ? blk_alloc_queue+0x533/0x700 [ 2863.550276][ T4149] __blk_mq_alloc_disk+0x86/0x190 [ 2863.550303][ T4149] loop_add+0x2c9/0x8f0 [ 2863.550330][ T4149] loop_control_ioctl+0x16c/0x480 [ 2863.641428][ T4149] ? loop_lookup+0x1d0/0x1d0 [ 2863.646029][ T4149] ? loop_lookup+0x1d0/0x1d0 [ 2863.650624][ T4149] ? __x64_sys_ioctl+0x118/0x200 [ 2863.655561][ T4149] ? loop_lookup+0x1d0/0x1d0 10:28:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2863.660159][ T4149] __x64_sys_ioctl+0x193/0x200 [ 2863.664934][ T4149] do_syscall_64+0x35/0xb0 [ 2863.669355][ T4149] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2863.675277][ T4149] RIP: 0033:0x4665d9 [ 2863.679168][ T4149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2863.699051][ T4149] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 10:28:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2863.707467][ T4149] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2863.715435][ T4149] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2863.723580][ T4149] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2863.731547][ T4149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2863.739515][ T4149] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000ecc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2863.772682][ T4141] loop4: detected capacity change from 0 to 1062 [ 2863.801277][ T4148] loop5: detected capacity change from 0 to 1030 [ 2863.812670][ T4141] EXT4-fs (loop4): Invalid log block size: 6029312 [ 2863.839655][ T4148] EXT4-fs (loop5): Invalid log cluster size: 12801 10:28:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002320000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:10 executing program 0 (fault-call:9 fault-nth:27): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000600004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2863.885146][ T4185] loop1: detected capacity change from 0 to 1054 [ 2863.894569][ T4185] EXT4-fs (loop1): Invalid log cluster size: 12643328 10:28:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2863.943460][ T4200] loop4: detected capacity change from 0 to 1062 [ 2863.957052][ T4201] loop5: detected capacity change from 0 to 1030 [ 2863.966613][ T4185] loop1: detected capacity change from 0 to 1054 [ 2863.972363][ T4197] FAULT_INJECTION: forcing a failure. [ 2863.972363][ T4197] name failslab, interval 1, probability 0, space 0, times 0 [ 2863.996119][ T4201] EXT4-fs (loop5): Invalid log cluster size: 12802 [ 2863.996883][ T4200] EXT4-fs (loop4): Invalid log block size: 6291456 [ 2864.010421][ T4185] EXT4-fs (loop1): Invalid log cluster size: 12643328 [ 2864.010872][ T4197] CPU: 1 PID: 4197 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2864.026914][ T4197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2864.036973][ T4197] Call Trace: [ 2864.040246][ T4197] dump_stack_lvl+0xcd/0x134 10:28:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2864.044844][ T4197] should_fail.cold+0x5/0xa [ 2864.049353][ T4197] ? blk_mq_init_allocated_queue+0xfd/0x1400 [ 2864.055339][ T4197] should_failslab+0x5/0x10 [ 2864.059849][ T4197] kmem_cache_alloc_trace+0x55/0x3c0 [ 2864.065137][ T4197] blk_mq_init_allocated_queue+0xfd/0x1400 [ 2864.070955][ T4197] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2864.077199][ T4197] ? blk_queue_dma_alignment+0xc/0x50 [ 2864.082570][ T4197] ? blk_set_default_limits+0x9/0x620 [ 2864.087946][ T4197] ? blk_alloc_queue+0x533/0x700 10:28:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2864.092892][ T4197] __blk_mq_alloc_disk+0x86/0x190 [ 2864.097933][ T4197] loop_add+0x2c9/0x8f0 [ 2864.102096][ T4197] loop_control_ioctl+0x16c/0x480 [ 2864.107125][ T4197] ? loop_lookup+0x1d0/0x1d0 [ 2864.111719][ T4197] ? __fget_files+0x288/0x3d0 [ 2864.116489][ T4197] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2864.122735][ T4197] ? loop_lookup+0x1d0/0x1d0 [ 2864.127332][ T4197] __x64_sys_ioctl+0x193/0x200 [ 2864.132100][ T4197] do_syscall_64+0x35/0xb0 [ 2864.136691][ T4197] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2864.142594][ T4197] RIP: 0033:0x4665d9 10:28:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2864.146572][ T4197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2864.166182][ T4197] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2864.174594][ T4197] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2864.182649][ T4197] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2864.190615][ T4197] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2864.198656][ T4197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2864.206610][ T4197] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000edc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003320000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2864.250444][ T4201] loop5: detected capacity change from 0 to 1030 [ 2864.258595][ T4201] EXT4-fs (loop5): Invalid log cluster size: 12802 [ 2864.266291][ T4200] loop4: detected capacity change from 0 to 1062 [ 2864.281760][ T4200] EXT4-fs (loop4): Invalid log block size: 6291456 [ 2864.320650][ T4234] loop1: detected capacity change from 0 to 1054 [ 2864.338138][ T4234] EXT4-fs (loop1): Invalid log cluster size: 12643584 [ 2864.359736][ T4241] loop5: detected capacity change from 0 to 1030 [ 2864.370463][ T4241] EXT4-fs (loop5): Invalid log cluster size: 12803 [ 2864.391655][ T4234] loop1: detected capacity change from 0 to 1054 [ 2864.399111][ T4234] EXT4-fs (loop1): Invalid log cluster size: 12643584 [ 2864.410735][ T4241] loop5: detected capacity change from 0 to 1030 [ 2864.418856][ T4241] EXT4-fs (loop5): Invalid log cluster size: 12803 10:28:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:11 executing program 0 (fault-call:9 fault-nth:28): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000680004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000eec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000330000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2864.842915][ T4263] loop5: detected capacity change from 0 to 1030 [ 2864.888865][ T4266] loop1: detected capacity change from 0 to 1054 [ 2864.902274][ T4267] loop4: detected capacity change from 0 to 1062 [ 2864.923171][ T4265] FAULT_INJECTION: forcing a failure. [ 2864.923171][ T4265] name failslab, interval 1, probability 0, space 0, times 0 [ 2864.935995][ T4263] EXT4-fs (loop5): Invalid log cluster size: 13056 [ 2864.969529][ T4266] EXT4-fs (loop1): Invalid log cluster size: 12643840 [ 2864.977433][ T4267] EXT4-fs (loop4): Invalid log block size: 6815744 [ 2864.987429][ T4265] CPU: 0 PID: 4265 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2864.997240][ T4265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2865.007288][ T4265] Call Trace: [ 2865.010559][ T4265] dump_stack_lvl+0xcd/0x134 [ 2865.015161][ T4265] should_fail.cold+0x5/0xa [ 2865.019670][ T4265] ? blk_mq_realloc_hw_ctxs+0x109/0x1570 [ 2865.025307][ T4265] should_failslab+0x5/0x10 [ 2865.029812][ T4265] __kmalloc_node+0x75/0x380 [ 2865.034409][ T4265] blk_mq_realloc_hw_ctxs+0x109/0x1570 [ 2865.039876][ T4265] ? lockdep_init_map_type+0x2c3/0x7b0 [ 2865.045342][ T4265] blk_mq_init_allocated_queue+0x320/0x1400 [ 2865.051242][ T4265] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2865.057485][ T4265] ? blk_queue_dma_alignment+0xc/0x50 [ 2865.062856][ T4265] ? blk_set_default_limits+0x9/0x620 10:28:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000e9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2865.068230][ T4265] ? blk_alloc_queue+0x533/0x700 [ 2865.073174][ T4265] __blk_mq_alloc_disk+0x86/0x190 [ 2865.078289][ T4265] loop_add+0x2c9/0x8f0 [ 2865.082453][ T4265] loop_control_ioctl+0x16c/0x480 [ 2865.087482][ T4265] ? loop_lookup+0x1d0/0x1d0 [ 2865.092077][ T4265] ? __fget_files+0x288/0x3d0 [ 2865.097124][ T4265] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2865.103371][ T4265] ? loop_lookup+0x1d0/0x1d0 [ 2865.107973][ T4265] __x64_sys_ioctl+0x193/0x200 [ 2865.112739][ T4265] do_syscall_64+0x35/0xb0 10:28:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001e9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2865.117158][ T4265] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2865.123056][ T4265] RIP: 0033:0x4665d9 [ 2865.126948][ T4265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2865.146579][ T4265] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2865.154992][ T4265] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 10:28:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000eac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2865.162963][ T4265] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2865.170930][ T4265] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2865.178893][ T4265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2865.186848][ T4265] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:11 executing program 0 (fault-call:9 fault-nth:29): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2865.242424][ T4267] loop4: detected capacity change from 0 to 1062 [ 2865.242428][ T4266] loop1: detected capacity change from 0 to 1054 [ 2865.260566][ T4266] EXT4-fs (loop1): Invalid log cluster size: 12643840 [ 2865.266747][ T4267] EXT4-fs (loop4): Invalid log block size: 6815744 [ 2865.296052][ T4289] FAULT_INJECTION: forcing a failure. [ 2865.296052][ T4289] name failslab, interval 1, probability 0, space 0, times 0 [ 2865.309100][ T4289] CPU: 0 PID: 4289 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2865.318815][ T4289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2865.328861][ T4289] Call Trace: [ 2865.332136][ T4289] dump_stack_lvl+0xcd/0x134 [ 2865.336728][ T4289] should_fail.cold+0x5/0xa [ 2865.341227][ T4289] ? blk_mq_realloc_hw_ctxs+0x933/0x1570 [ 2865.346863][ T4289] should_failslab+0x5/0x10 [ 2865.351365][ T4289] __kmalloc_node+0x75/0x380 [ 2865.355959][ T4289] blk_mq_realloc_hw_ctxs+0x933/0x1570 [ 2865.361424][ T4289] blk_mq_init_allocated_queue+0x320/0x1400 [ 2865.367315][ T4289] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2865.373554][ T4289] ? blk_queue_dma_alignment+0xc/0x50 [ 2865.378906][ T4289] ? blk_set_default_limits+0x9/0x620 [ 2865.384462][ T4289] ? blk_alloc_queue+0x533/0x700 [ 2865.389388][ T4289] __blk_mq_alloc_disk+0x86/0x190 [ 2865.394412][ T4289] loop_add+0x2c9/0x8f0 [ 2865.398557][ T4289] loop_control_ioctl+0x16c/0x480 [ 2865.403566][ T4289] ? loop_lookup+0x1d0/0x1d0 [ 2865.408152][ T4289] ? __x64_sys_ioctl+0xbe/0x200 [ 2865.412983][ T4289] ? loop_lookup+0x1d0/0x1d0 [ 2865.417555][ T4289] __x64_sys_ioctl+0x193/0x200 [ 2865.422299][ T4289] do_syscall_64+0x35/0xb0 [ 2865.426699][ T4289] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2865.432577][ T4289] RIP: 0033:0x4665d9 [ 2865.436450][ T4289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2865.456038][ T4289] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2865.464428][ T4289] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2865.472379][ T4289] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2865.480335][ T4289] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2865.488283][ T4289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2865.496233][ T4289] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000006c0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001330000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001eac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:11 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:11 executing program 0 (fault-call:9 fault-nth:30): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000efc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2865.618638][ T4304] loop5: detected capacity change from 0 to 1030 [ 2865.657497][ T4308] loop1: detected capacity change from 0 to 1054 10:28:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000ebc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2865.665185][ T4310] loop4: detected capacity change from 0 to 1062 [ 2865.667108][ T4307] FAULT_INJECTION: forcing a failure. [ 2865.667108][ T4307] name failslab, interval 1, probability 0, space 0, times 0 [ 2865.677344][ T4308] EXT4-fs (loop1): Invalid log cluster size: 12644096 [ 2865.696765][ T4310] EXT4-fs (loop4): Invalid log block size: 7077888 [ 2865.699834][ T4304] EXT4-fs (loop5): Invalid log cluster size: 13057 10:28:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001ebc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2865.704981][ T4307] CPU: 0 PID: 4307 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2865.719627][ T4307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2865.729678][ T4307] Call Trace: [ 2865.732950][ T4307] dump_stack_lvl+0xcd/0x134 [ 2865.737548][ T4307] should_fail.cold+0x5/0xa [ 2865.742051][ T4307] ? blk_mq_realloc_hw_ctxs+0xbed/0x1570 [ 2865.747692][ T4307] should_failslab+0x5/0x10 [ 2865.752204][ T4307] __kmalloc_node+0x75/0x380 [ 2865.756794][ T4307] blk_mq_realloc_hw_ctxs+0xbed/0x1570 [ 2865.762266][ T4307] blk_mq_init_allocated_queue+0x320/0x1400 10:28:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000ecc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001ecc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2865.768165][ T4307] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2865.774407][ T4307] ? blk_queue_dma_alignment+0xc/0x50 [ 2865.779795][ T4307] ? blk_set_default_limits+0x9/0x620 [ 2865.785168][ T4307] ? blk_alloc_queue+0x533/0x700 [ 2865.790113][ T4307] __blk_mq_alloc_disk+0x86/0x190 [ 2865.795141][ T4307] loop_add+0x2c9/0x8f0 [ 2865.799297][ T4307] loop_control_ioctl+0x16c/0x480 [ 2865.804326][ T4307] ? loop_lookup+0x1d0/0x1d0 [ 2865.808919][ T4307] ? __fget_files+0x288/0x3d0 10:28:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000edc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2865.813600][ T4307] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2865.819843][ T4307] ? loop_lookup+0x1d0/0x1d0 [ 2865.824441][ T4307] __x64_sys_ioctl+0x193/0x200 [ 2865.829234][ T4307] do_syscall_64+0x35/0xb0 [ 2865.833654][ T4307] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2865.839548][ T4307] RIP: 0033:0x4665d9 [ 2865.843522][ T4307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:28:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001edc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2865.863116][ T4307] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2865.871529][ T4307] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2865.879497][ T4307] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2865.887467][ T4307] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2865.895441][ T4307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2865.903406][ T4307] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2865.944498][ T4304] loop5: detected capacity change from 0 to 1030 [ 2865.944630][ T4310] loop4: detected capacity change from 0 to 1062 [ 2865.963412][ T4308] loop1: detected capacity change from 0 to 1054 [ 2865.974709][ T4308] EXT4-fs (loop1): Invalid log cluster size: 12644096 10:28:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000740004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2865.992167][ T4310] EXT4-fs (loop4): Invalid log block size: 7077888 [ 2865.999342][ T4304] EXT4-fs (loop5): Invalid log cluster size: 13057 10:28:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002330000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000eec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2866.091483][ T4352] loop4: detected capacity change from 0 to 1062 [ 2866.092855][ T4349] loop5: detected capacity change from 0 to 1030 [ 2866.104438][ T4352] EXT4-fs (loop4): Invalid log block size: 7602176 [ 2866.126223][ T4349] EXT4-fs (loop5): Invalid log cluster size: 13058 10:28:12 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:12 executing program 0 (fault-call:9 fault-nth:31): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001eec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003330000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000007a0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2866.514486][ T4369] loop1: detected capacity change from 0 to 1054 [ 2866.538137][ T4374] loop5: detected capacity change from 0 to 1030 [ 2866.547051][ T4369] EXT4-fs (loop1): Invalid log cluster size: 12644352 10:28:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000efc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2866.568103][ T4379] loop4: detected capacity change from 0 to 1062 [ 2866.571627][ T4376] FAULT_INJECTION: forcing a failure. [ 2866.571627][ T4376] name failslab, interval 1, probability 0, space 0, times 0 10:28:12 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2866.623026][ T4374] EXT4-fs (loop5): Invalid log cluster size: 13059 [ 2866.630230][ T4369] loop1: detected capacity change from 0 to 1054 [ 2866.646404][ T4379] EXT4-fs (loop4): Invalid log block size: 7995392 10:28:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000810004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2866.668036][ T4369] EXT4-fs (loop1): Invalid log cluster size: 12644352 [ 2866.678847][ T4376] CPU: 1 PID: 4376 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2866.688580][ T4376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2866.698631][ T4376] Call Trace: [ 2866.701904][ T4376] dump_stack_lvl+0xcd/0x134 [ 2866.706506][ T4376] should_fail.cold+0x5/0xa [ 2866.711446][ T4376] ? sbitmap_init_node+0x1c3/0x6f0 [ 2866.716557][ T4376] should_failslab+0x5/0x10 10:28:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001efc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000080890004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2866.721061][ T4376] __kmalloc_node+0x75/0x380 [ 2866.725652][ T4376] sbitmap_init_node+0x1c3/0x6f0 [ 2866.730593][ T4376] ? trace_kmalloc_node+0x32/0xf0 [ 2866.735706][ T4376] blk_mq_realloc_hw_ctxs+0xc64/0x1570 [ 2866.741179][ T4376] blk_mq_init_allocated_queue+0x320/0x1400 [ 2866.747086][ T4376] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2866.753337][ T4376] ? blk_queue_dma_alignment+0xc/0x50 [ 2866.758712][ T4376] ? blk_set_default_limits+0x9/0x620 [ 2866.764083][ T4376] ? blk_alloc_queue+0x533/0x700 [ 2866.769015][ T4376] __blk_mq_alloc_disk+0x86/0x190 10:28:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000ffffff8c0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2866.774044][ T4376] loop_add+0x2c9/0x8f0 [ 2866.778203][ T4376] ? loop_control_ioctl+0x15f/0x480 [ 2866.783408][ T4376] loop_control_ioctl+0x16c/0x480 [ 2866.788434][ T4376] ? loop_lookup+0x1d0/0x1d0 [ 2866.793029][ T4376] ? __fget_files+0x288/0x3d0 [ 2866.797798][ T4376] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2866.804043][ T4376] ? loop_lookup+0x1d0/0x1d0 [ 2866.808637][ T4376] __x64_sys_ioctl+0x193/0x200 [ 2866.813396][ T4376] do_syscall_64+0x35/0xb0 [ 2866.817815][ T4376] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2866.823715][ T4376] RIP: 0033:0x4665d9 [ 2866.827604][ T4376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2866.847210][ T4376] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2866.855621][ T4376] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2866.863588][ T4376] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 10:28:13 executing program 0 (fault-call:9 fault-nth:32): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2866.871644][ T4376] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2866.879610][ T4376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2866.887577][ T4376] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001f0c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000340000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000930004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2866.978684][ T4403] FAULT_INJECTION: forcing a failure. [ 2866.978684][ T4403] name failslab, interval 1, probability 0, space 0, times 0 [ 2867.004093][ T4403] CPU: 1 PID: 4403 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2867.013830][ T4403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2867.014699][ T4408] loop5: detected capacity change from 0 to 1030 [ 2867.023877][ T4403] Call Trace: [ 2867.023885][ T4403] dump_stack_lvl+0xcd/0x134 [ 2867.023920][ T4403] should_fail.cold+0x5/0xa [ 2867.042513][ T4403] ? blk_alloc_flush_queue+0x91/0x320 [ 2867.047885][ T4403] should_failslab+0x5/0x10 [ 2867.052398][ T4403] kmem_cache_alloc_node_trace+0x59/0x400 [ 2867.058116][ T4403] ? blk_alloc_flush_queue+0x46/0x320 [ 2867.063493][ T4403] blk_alloc_flush_queue+0x91/0x320 [ 2867.068688][ T4403] blk_mq_realloc_hw_ctxs+0xdd0/0x1570 [ 2867.068847][ T4408] EXT4-fs (loop5): Invalid log cluster size: 13312 [ 2867.074147][ T4403] blk_mq_init_allocated_queue+0x320/0x1400 [ 2867.074178][ T4403] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2867.092925][ T4403] ? blk_queue_dma_alignment+0xc/0x50 [ 2867.098299][ T4403] ? blk_set_default_limits+0x9/0x620 [ 2867.103669][ T4403] ? blk_alloc_queue+0x533/0x700 [ 2867.108612][ T4403] __blk_mq_alloc_disk+0x86/0x190 [ 2867.113640][ T4403] loop_add+0x2c9/0x8f0 [ 2867.117803][ T4403] loop_control_ioctl+0x16c/0x480 [ 2867.122829][ T4403] ? loop_lookup+0x1d0/0x1d0 10:28:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2867.127427][ T4403] ? __sanitizer_cov_trace_pc+0x7/0x60 [ 2867.132883][ T4403] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2867.136922][ T4409] loop4: detected capacity change from 0 to 1062 [ 2867.139121][ T4403] ? loop_lookup+0x1d0/0x1d0 [ 2867.139149][ T4403] __x64_sys_ioctl+0x193/0x200 [ 2867.148036][ T4409] EXT4-fs (loop4): Invalid log block size: 9633792 [ 2867.150013][ T4403] do_syscall_64+0x35/0xb0 [ 2867.150038][ T4403] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2867.171515][ T4403] RIP: 0033:0x4665d9 [ 2867.175414][ T4403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2867.195187][ T4403] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2867.203597][ T4403] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2867.211551][ T4403] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2867.219504][ T4403] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2867.227453][ T4403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2867.235410][ T4403] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2867.276218][ T4419] loop1: detected capacity change from 0 to 1054 [ 2867.288829][ T4409] loop4: detected capacity change from 0 to 1062 [ 2867.295761][ T4408] loop5: detected capacity change from 0 to 1030 [ 2867.304632][ T4409] EXT4-fs (loop4): Invalid log block size: 9633792 [ 2867.311251][ T4408] EXT4-fs (loop5): Invalid log cluster size: 13312 [ 2867.313209][ T4419] EXT4-fs (loop1): Invalid log cluster size: 12644608 [ 2867.372561][ T4419] loop1: detected capacity change from 0 to 1054 [ 2867.381395][ T4419] EXT4-fs (loop1): Invalid log cluster size: 12644608 10:28:13 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001f1c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:13 executing program 0 (fault-call:9 fault-nth:33): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001340000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000940004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2867.593119][ T4438] loop1: detected capacity change from 0 to 1054 [ 2867.617031][ T4441] loop4: detected capacity change from 0 to 1062 [ 2867.636951][ T4442] loop5: detected capacity change from 0 to 1030 10:28:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2867.647302][ T4440] FAULT_INJECTION: forcing a failure. [ 2867.647302][ T4440] name failslab, interval 1, probability 0, space 0, times 0 [ 2867.671763][ T4438] EXT4-fs (loop1): Invalid log cluster size: 12644864 [ 2867.691681][ T4441] EXT4-fs (loop4): Invalid log block size: 9699328 [ 2867.696992][ T4442] EXT4-fs (loop5): Invalid log cluster size: 13313 [ 2867.710255][ T4440] CPU: 1 PID: 4440 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2867.720218][ T4440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2867.730269][ T4440] Call Trace: [ 2867.733543][ T4440] dump_stack_lvl+0xcd/0x134 [ 2867.738139][ T4440] should_fail.cold+0x5/0xa [ 2867.742646][ T4440] ? blk_alloc_flush_queue+0x91/0x320 [ 2867.748016][ T4440] should_failslab+0x5/0x10 [ 2867.752610][ T4440] kmem_cache_alloc_node_trace+0x59/0x400 [ 2867.758333][ T4440] blk_alloc_flush_queue+0x91/0x320 [ 2867.763521][ T4440] blk_mq_realloc_hw_ctxs+0xdd0/0x1570 [ 2867.768975][ T4440] blk_mq_init_allocated_queue+0x320/0x1400 [ 2867.774860][ T4440] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2867.781087][ T4440] ? blk_queue_dma_alignment+0xc/0x50 [ 2867.786443][ T4440] ? blk_set_default_limits+0x9/0x620 [ 2867.791799][ T4440] ? blk_alloc_queue+0x533/0x700 [ 2867.797160][ T4440] __blk_mq_alloc_disk+0x86/0x190 [ 2867.802176][ T4440] loop_add+0x2c9/0x8f0 [ 2867.806334][ T4440] loop_control_ioctl+0x16c/0x480 [ 2867.811349][ T4440] ? loop_lookup+0x1d0/0x1d0 [ 2867.815926][ T4440] ? __fget_files+0x288/0x3d0 [ 2867.820591][ T4440] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2867.826819][ T4440] ? loop_lookup+0x1d0/0x1d0 [ 2867.831401][ T4440] __x64_sys_ioctl+0x193/0x200 [ 2867.836153][ T4440] do_syscall_64+0x35/0xb0 [ 2867.840558][ T4440] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2867.846445][ T4440] RIP: 0033:0x4665d9 [ 2867.850327][ T4440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2867.869921][ T4440] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2867.878320][ T4440] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2867.886275][ T4440] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 10:28:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002340000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001f2c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2867.894230][ T4440] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2867.902201][ T4440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2867.910377][ T4440] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000950004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:14 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:14 executing program 0 (fault-call:9 fault-nth:34): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2867.976308][ T4438] loop1: detected capacity change from 0 to 1054 [ 2867.995555][ T4438] EXT4-fs (loop1): Invalid log cluster size: 12644864 10:28:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2868.051396][ T4458] loop5: detected capacity change from 0 to 1030 [ 2868.065471][ T4460] loop4: detected capacity change from 0 to 1062 [ 2868.115057][ T4460] EXT4-fs (loop4): Invalid log block size: 9764864 [ 2868.126650][ T4458] EXT4-fs (loop5): Invalid log cluster size: 13314 [ 2868.130454][ T4468] loop1: detected capacity change from 0 to 1054 [ 2868.147307][ T4468] EXT4-fs (loop1): Invalid log cluster size: 12645120 [ 2868.152579][ T4464] FAULT_INJECTION: forcing a failure. [ 2868.152579][ T4464] name failslab, interval 1, probability 0, space 0, times 0 [ 2868.183803][ T4460] loop4: detected capacity change from 0 to 1062 [ 2868.185917][ T4464] CPU: 0 PID: 4464 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2868.192292][ T4460] EXT4-fs (loop4): Invalid log block size: 9764864 [ 2868.199994][ T4464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2868.200006][ T4464] Call Trace: [ 2868.200013][ T4464] dump_stack_lvl+0xcd/0x134 [ 2868.200043][ T4464] should_fail.cold+0x5/0xa [ 2868.200065][ T4464] ? __alloc_disk_node+0x4e/0x380 [ 2868.200087][ T4464] should_failslab+0x5/0x10 [ 2868.200110][ T4464] kmem_cache_alloc_node_trace+0x59/0x400 [ 2868.221855][ T4468] loop1: detected capacity change from 0 to 1054 [ 2868.224431][ T4464] __alloc_disk_node+0x4e/0x380 [ 2868.224462][ T4464] __blk_mq_alloc_disk+0xec/0x190 [ 2868.232833][ T4468] EXT4-fs (loop1): Invalid log cluster size: 12645120 [ 2868.233943][ T4464] loop_add+0x2c9/0x8f0 [ 2868.233975][ T4464] loop_control_ioctl+0x16c/0x480 [ 2868.253091][ T4458] loop5: detected capacity change from 0 to 1030 [ 2868.255268][ T4464] ? loop_lookup+0x1d0/0x1d0 [ 2868.261918][ T4458] EXT4-fs (loop5): Invalid log cluster size: 13314 [ 2868.266991][ T4464] ? __fget_files+0x288/0x3d0 [ 2868.267020][ T4464] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2868.304340][ T4464] ? loop_lookup+0x1d0/0x1d0 [ 2868.308939][ T4464] __x64_sys_ioctl+0x193/0x200 [ 2868.313706][ T4464] do_syscall_64+0x35/0xb0 [ 2868.318120][ T4464] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2868.323999][ T4464] RIP: 0033:0x4665d9 [ 2868.327874][ T4464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2868.347551][ T4464] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2868.355955][ T4464] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 10:28:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001f3c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:14 executing program 0 (fault-call:9 fault-nth:35): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2868.363909][ T4464] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2868.371859][ T4464] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2868.379810][ T4464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2868.387937][ T4464] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003340000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000960004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2868.525936][ T4487] FAULT_INJECTION: forcing a failure. [ 2868.525936][ T4487] name failslab, interval 1, probability 0, space 0, times 0 [ 2868.541653][ T4492] loop5: detected capacity change from 0 to 1030 [ 2868.542736][ T4489] loop4: detected capacity change from 0 to 1062 [ 2868.566870][ T4487] CPU: 1 PID: 4487 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2868.575727][ T4492] EXT4-fs (loop5): Invalid log cluster size: 13315 [ 2868.576610][ T4487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2868.593111][ T4487] Call Trace: [ 2868.596382][ T4487] dump_stack_lvl+0xcd/0x134 [ 2868.600979][ T4487] should_fail.cold+0x5/0xa [ 2868.605486][ T4487] ? bdev_alloc_inode+0x18/0x80 [ 2868.610338][ T4487] ? bdev_free_inode+0x80/0x80 [ 2868.615100][ T4487] ? bdev_alloc_inode+0x18/0x80 [ 2868.619956][ T4487] should_failslab+0x5/0x10 [ 2868.624463][ T4487] kmem_cache_alloc+0x5e/0x4a0 [ 2868.629232][ T4487] ? bdev_free_inode+0x80/0x80 [ 2868.633997][ T4487] bdev_alloc_inode+0x18/0x80 [ 2868.638675][ T4487] ? bdev_free_inode+0x80/0x80 [ 2868.643431][ T4487] alloc_inode+0x61/0x230 [ 2868.647746][ T4487] new_inode+0x27/0x2f0 [ 2868.651885][ T4487] bdev_alloc+0x20/0x2e0 [ 2868.656119][ T4487] ? __kasan_kmalloc+0x9b/0xd0 [ 2868.660869][ T4487] __alloc_disk_node+0x71/0x380 [ 2868.665713][ T4487] __blk_mq_alloc_disk+0xec/0x190 [ 2868.670730][ T4487] loop_add+0x2c9/0x8f0 [ 2868.674883][ T4487] loop_control_ioctl+0x16c/0x480 [ 2868.679910][ T4487] ? loop_lookup+0x1d0/0x1d0 [ 2868.684488][ T4487] ? __fget_files+0x288/0x3d0 [ 2868.689155][ T4487] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2868.695384][ T4487] ? loop_lookup+0x1d0/0x1d0 [ 2868.699965][ T4487] __x64_sys_ioctl+0x193/0x200 [ 2868.704715][ T4487] do_syscall_64+0x35/0xb0 [ 2868.709117][ T4487] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2868.714999][ T4487] RIP: 0033:0x4665d9 [ 2868.718961][ T4487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2868.738572][ T4487] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2868.746969][ T4487] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2868.754922][ T4487] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2868.762893][ T4487] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 10:28:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001f4c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2868.770849][ T4487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2868.778804][ T4487] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2868.808257][ T4496] loop1: detected capacity change from 0 to 1054 10:28:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000350000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2868.821835][ T4489] EXT4-fs (loop4): Invalid log block size: 9830400 [ 2868.849554][ T4496] EXT4-fs (loop1): Invalid log cluster size: 12645376 10:28:15 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000970004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:15 executing program 0 (fault-call:9 fault-nth:36): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2868.900970][ T4496] loop1: detected capacity change from 0 to 1054 [ 2868.914089][ T4496] EXT4-fs (loop1): Invalid log cluster size: 12645376 10:28:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2868.949784][ T4509] loop4: detected capacity change from 0 to 1062 [ 2868.988336][ T4509] EXT4-fs (loop4): Invalid log block size: 9895936 [ 2869.016165][ T4514] FAULT_INJECTION: forcing a failure. [ 2869.016165][ T4514] name failslab, interval 1, probability 0, space 0, times 0 [ 2869.033927][ T4514] CPU: 0 PID: 4514 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2869.043647][ T4514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2869.046470][ T4516] loop1: detected capacity change from 0 to 1054 [ 2869.053695][ T4514] Call Trace: [ 2869.053702][ T4514] dump_stack_lvl+0xcd/0x134 [ 2869.053733][ T4514] should_fail.cold+0x5/0xa [ 2869.053754][ T4514] ? security_inode_alloc+0x34/0x160 [ 2869.063064][ T4516] EXT4-fs (loop1): Invalid log cluster size: 12645632 [ 2869.063311][ T4514] ? security_inode_alloc+0x34/0x160 [ 2869.089932][ T4514] should_failslab+0x5/0x10 [ 2869.094422][ T4514] kmem_cache_alloc+0x5e/0x4a0 [ 2869.099346][ T4514] security_inode_alloc+0x34/0x160 [ 2869.104464][ T4514] inode_init_always+0x5d8/0xd60 [ 2869.109391][ T4514] alloc_inode+0x82/0x230 [ 2869.113713][ T4514] new_inode+0x27/0x2f0 [ 2869.117848][ T4514] bdev_alloc+0x20/0x2e0 [ 2869.122073][ T4514] ? __kasan_kmalloc+0x9b/0xd0 [ 2869.126817][ T4514] __alloc_disk_node+0x71/0x380 [ 2869.131657][ T4514] __blk_mq_alloc_disk+0xec/0x190 [ 2869.136666][ T4514] loop_add+0x2c9/0x8f0 [ 2869.140806][ T4514] loop_control_ioctl+0x16c/0x480 [ 2869.145991][ T4514] ? loop_lookup+0x1d0/0x1d0 [ 2869.150583][ T4514] ? __fget_files+0x288/0x3d0 [ 2869.155245][ T4514] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2869.161471][ T4514] ? loop_lookup+0x1d0/0x1d0 [ 2869.166061][ T4514] __x64_sys_ioctl+0x193/0x200 [ 2869.170809][ T4514] do_syscall_64+0x35/0xb0 [ 2869.175207][ T4514] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2869.181090][ T4514] RIP: 0033:0x4665d9 [ 2869.184973][ T4514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2869.204997][ T4514] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 10:28:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001f5c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2869.213393][ T4514] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2869.221989][ T4514] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2869.230325][ T4514] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2869.238509][ T4514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2869.246857][ T4514] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:15 executing program 0 (fault-call:9 fault-nth:37): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2869.304685][ T4509] loop4: detected capacity change from 0 to 1062 [ 2869.309851][ T4516] loop1: detected capacity change from 0 to 1054 [ 2869.320532][ T4509] EXT4-fs (loop4): Invalid log block size: 9895936 [ 2869.325392][ T4516] EXT4-fs (loop1): Invalid log cluster size: 12645632 10:28:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000980004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001f6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2869.356358][ T4531] loop5: detected capacity change from 0 to 1030 10:28:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f6c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2869.408119][ T4534] loop4: detected capacity change from 0 to 1062 [ 2869.410478][ T4530] FAULT_INJECTION: forcing a failure. [ 2869.410478][ T4530] name failslab, interval 1, probability 0, space 0, times 0 [ 2869.431124][ T4534] EXT4-fs (loop4): Invalid log block size: 9961472 [ 2869.446834][ T4531] EXT4-fs (loop5): Invalid log cluster size: 13568 [ 2869.455130][ T4530] CPU: 1 PID: 4530 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2869.464940][ T4530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2869.475795][ T4530] Call Trace: [ 2869.479070][ T4530] dump_stack_lvl+0xcd/0x134 [ 2869.483665][ T4530] should_fail.cold+0x5/0xa [ 2869.488167][ T4530] ? rand_initialize_disk+0x3b/0xc0 [ 2869.493363][ T4530] should_failslab+0x5/0x10 [ 2869.497870][ T4530] kmem_cache_alloc_trace+0x55/0x3c0 [ 2869.501940][ T4540] loop1: detected capacity change from 0 to 1054 [ 2869.503162][ T4530] rand_initialize_disk+0x3b/0xc0 [ 2869.503189][ T4530] __alloc_disk_node+0x1f6/0x380 [ 2869.512541][ T4540] EXT4-fs (loop1): Invalid log cluster size: 12645888 [ 2869.514487][ T4530] __blk_mq_alloc_disk+0xec/0x190 [ 2869.514519][ T4530] loop_add+0x2c9/0x8f0 [ 2869.535330][ T4530] loop_control_ioctl+0x16c/0x480 [ 2869.540400][ T4530] ? loop_lookup+0x1d0/0x1d0 [ 2869.545032][ T4530] ? loop_lookup+0x1d0/0x1d0 [ 2869.549606][ T4530] ? __x64_sys_ioctl+0x118/0x200 [ 2869.554527][ T4530] ? loop_lookup+0x1d0/0x1d0 [ 2869.559118][ T4530] __x64_sys_ioctl+0x193/0x200 [ 2869.563866][ T4530] do_syscall_64+0x35/0xb0 [ 2869.568268][ T4530] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2869.574210][ T4530] RIP: 0033:0x4665d9 [ 2869.578084][ T4530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2869.597675][ T4530] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2869.606066][ T4530] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2869.614031][ T4530] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2869.621985][ T4530] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2869.630024][ T4530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2869.637991][ T4530] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2869.684096][ T4534] loop4: detected capacity change from 0 to 1062 [ 2869.699927][ T4531] loop5: detected capacity change from 0 to 1030 [ 2869.711910][ T4540] loop1: detected capacity change from 0 to 1054 [ 2869.712613][ T4534] EXT4-fs (loop4): Invalid log block size: 9961472 [ 2869.719261][ T4540] EXT4-fs (loop1): Invalid log cluster size: 12645888 [ 2869.734739][ T4531] EXT4-fs (loop5): Invalid log cluster size: 13568 10:28:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001350000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:16 executing program 0 (fault-call:9 fault-nth:38): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000990004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:16 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001f7c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2869.881424][ T4563] loop1: detected capacity change from 0 to 1054 [ 2869.885219][ T4562] loop4: detected capacity change from 0 to 1062 [ 2869.898863][ T4564] loop5: detected capacity change from 0 to 1030 [ 2869.926612][ T4563] EXT4-fs (loop1): Invalid log cluster size: 12646144 [ 2869.949023][ T4564] EXT4-fs (loop5): Invalid log cluster size: 13569 [ 2869.962237][ T4562] EXT4-fs (loop4): Invalid log block size: 10027008 10:28:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2869.990707][ T4573] FAULT_INJECTION: forcing a failure. [ 2869.990707][ T4573] name failslab, interval 1, probability 0, space 0, times 0 [ 2870.016504][ T4573] CPU: 0 PID: 4573 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2870.026247][ T4573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2870.036324][ T4573] Call Trace: 10:28:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001f8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2870.039595][ T4573] dump_stack_lvl+0xcd/0x134 [ 2870.044196][ T4573] should_fail.cold+0x5/0xa [ 2870.048705][ T4573] ? blk_mq_init_tags+0x6f/0x2a0 [ 2870.053648][ T4573] should_failslab+0x5/0x10 [ 2870.058154][ T4573] kmem_cache_alloc_node_trace+0x59/0x400 [ 2870.063877][ T4573] blk_mq_init_tags+0x6f/0x2a0 [ 2870.068648][ T4573] blk_mq_alloc_rq_map+0x58/0x1d0 [ 2870.073675][ T4573] ? blk_mq_queue_inflight+0xa0/0xa0 [ 2870.078966][ T4573] blk_mq_init_sched+0x22a/0x1130 [ 2870.083987][ T4573] ? blk_queue_flag_set+0x22/0x30 10:28:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001f9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000fac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2870.089019][ T4573] elevator_init_mq+0x39d/0x480 [ 2870.093966][ T4573] __device_add_disk+0x5b9/0xd10 [ 2870.098912][ T4573] loop_add+0x68f/0x8f0 [ 2870.103073][ T4573] loop_control_ioctl+0x16c/0x480 [ 2870.108105][ T4573] ? loop_lookup+0x1d0/0x1d0 [ 2870.112701][ T4573] ? __fget_files+0x288/0x3d0 [ 2870.117387][ T4573] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2870.123634][ T4573] ? loop_lookup+0x1d0/0x1d0 [ 2870.128233][ T4573] __x64_sys_ioctl+0x193/0x200 [ 2870.133006][ T4573] do_syscall_64+0x35/0xb0 [ 2870.137514][ T4573] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2870.143503][ T4573] RIP: 0033:0x4665d9 [ 2870.147397][ T4573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2870.167093][ T4573] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2870.175909][ T4573] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 10:28:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002350000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001fac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2870.184144][ T4573] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2870.192098][ T4573] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 [ 2870.200052][ T4573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2870.208004][ T4573] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 [ 2870.231460][ T4563] loop1: detected capacity change from 0 to 1054 [ 2870.258976][ T4563] EXT4-fs (loop1): Invalid log cluster size: 12646144 [ 2870.288375][ T4573] "mq-deadline" elevator initialization failed, falling back to "none" 10:28:16 executing program 0 (fault-call:9 fault-nth:39): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000009a0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f8c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000fbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:16 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2870.319765][ T4595] loop5: detected capacity change from 0 to 1030 [ 2870.330128][ T4595] EXT4-fs (loop5): Invalid log cluster size: 13570 [ 2870.374117][ T4603] loop4: detected capacity change from 0 to 1062 [ 2870.403245][ T4595] loop5: detected capacity change from 0 to 1030 [ 2870.412246][ T4603] EXT4-fs (loop4): Invalid log block size: 10092544 [ 2870.422313][ T4610] loop1: detected capacity change from 0 to 1054 10:28:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001fbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000009b0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2870.447204][ T4595] EXT4-fs (loop5): Invalid log cluster size: 13570 [ 2870.483312][ T4608] FAULT_INJECTION: forcing a failure. [ 2870.483312][ T4608] name failslab, interval 1, probability 0, space 0, times 0 [ 2870.499629][ T4610] EXT4-fs (loop1): Invalid log cluster size: 12646400 [ 2870.530266][ T4608] CPU: 1 PID: 4608 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2870.537528][ T4621] loop4: detected capacity change from 0 to 1062 [ 2870.540031][ T4608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2870.540044][ T4608] Call Trace: [ 2870.540051][ T4608] dump_stack_lvl+0xcd/0x134 [ 2870.540079][ T4608] should_fail.cold+0x5/0xa [ 2870.540103][ T4608] ? sbitmap_init_node+0x1c3/0x6f0 [ 2870.540126][ T4608] should_failslab+0x5/0x10 [ 2870.540149][ T4608] __kmalloc_node+0x75/0x380 [ 2870.553279][ T4621] EXT4-fs (loop4): Invalid log block size: 10158080 [ 2870.556593][ T4608] sbitmap_init_node+0x1c3/0x6f0 [ 2870.556623][ T4608] sbitmap_queue_init_node+0x3e/0x480 10:28:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000f9c000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2870.600116][ T4608] ? lockdep_init_map_type+0x2c3/0x7b0 [ 2870.605580][ T4608] blk_mq_init_bitmaps+0x57/0x180 [ 2870.610607][ T4608] blk_mq_init_tags+0x1a2/0x2a0 [ 2870.615458][ T4608] blk_mq_alloc_rq_map+0x58/0x1d0 [ 2870.620482][ T4608] ? blk_mq_queue_inflight+0xa0/0xa0 [ 2870.625786][ T4608] blk_mq_init_sched+0x22a/0x1130 [ 2870.630958][ T4608] ? blk_queue_flag_set+0x22/0x30 [ 2870.636382][ T4608] elevator_init_mq+0x39d/0x480 [ 2870.641220][ T4608] __device_add_disk+0x5b9/0xd10 [ 2870.646154][ T4608] loop_add+0x68f/0x8f0 [ 2870.650295][ T4608] loop_control_ioctl+0x16c/0x480 [ 2870.655304][ T4608] ? loop_lookup+0x1d0/0x1d0 [ 2870.659877][ T4608] ? __fget_files+0x288/0x3d0 [ 2870.664538][ T4608] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2870.670765][ T4608] ? loop_lookup+0x1d0/0x1d0 [ 2870.675354][ T4608] __x64_sys_ioctl+0x193/0x200 [ 2870.680106][ T4608] do_syscall_64+0x35/0xb0 [ 2870.684521][ T4608] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2870.690398][ T4608] RIP: 0033:0x4665d9 [ 2870.694277][ T4608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2870.714070][ T4608] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2870.722463][ T4608] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2870.730714][ T4608] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2870.738862][ T4608] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 10:28:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003350000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000fcc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2870.746910][ T4608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2870.754866][ T4608] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2870.780637][ T4608] "mq-deadline" elevator initialization failed, falling back to "none" 10:28:17 executing program 0 (fault-call:9 fault-nth:40): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2870.799314][ T4621] loop4: detected capacity change from 0 to 1062 [ 2870.818202][ T4621] EXT4-fs (loop4): Invalid log block size: 10158080 [ 2870.823169][ T4628] loop1: detected capacity change from 0 to 1054 10:28:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000b80004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001fcc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2870.864989][ T4628] EXT4-fs (loop1): Invalid log cluster size: 12646656 [ 2870.873279][ T4633] loop5: detected capacity change from 0 to 1030 [ 2870.892124][ T4633] EXT4-fs (loop5): Invalid log cluster size: 13571 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000fdc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2870.931357][ T4628] loop1: detected capacity change from 0 to 1054 [ 2870.942196][ T4628] EXT4-fs (loop1): Invalid log cluster size: 12646656 [ 2870.955855][ T4647] loop4: detected capacity change from 0 to 1062 [ 2870.978977][ T4649] FAULT_INJECTION: forcing a failure. [ 2870.978977][ T4649] name failslab, interval 1, probability 0, space 0, times 0 [ 2871.007317][ T4649] CPU: 0 PID: 4649 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2871.010523][ T4633] loop5: detected capacity change from 0 to 1030 [ 2871.017127][ T4649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2871.017140][ T4649] Call Trace: [ 2871.017146][ T4649] dump_stack_lvl+0xcd/0x134 [ 2871.017174][ T4649] should_fail.cold+0x5/0xa [ 2871.017194][ T4649] ? sbitmap_queue_init_node+0x1d8/0x480 [ 2871.017217][ T4649] should_failslab+0x5/0x10 [ 2871.017236][ T4649] kmem_cache_alloc_node_trace+0x59/0x400 [ 2871.017256][ T4649] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2871.017280][ T4649] sbitmap_queue_init_node+0x1d8/0x480 [ 2871.017303][ T4649] blk_mq_init_bitmaps+0x57/0x180 [ 2871.017320][ T4649] blk_mq_init_tags+0x1a2/0x2a0 [ 2871.017335][ T4649] blk_mq_alloc_rq_map+0x58/0x1d0 [ 2871.017352][ T4649] ? blk_mq_queue_inflight+0xa0/0xa0 [ 2871.017370][ T4649] blk_mq_init_sched+0x22a/0x1130 [ 2871.017392][ T4649] ? blk_queue_flag_set+0x22/0x30 [ 2871.017412][ T4649] elevator_init_mq+0x39d/0x480 [ 2871.017429][ T4649] __device_add_disk+0x5b9/0xd10 [ 2871.017448][ T4649] loop_add+0x68f/0x8f0 [ 2871.017468][ T4649] loop_control_ioctl+0x16c/0x480 [ 2871.017485][ T4649] ? loop_lookup+0x1d0/0x1d0 10:28:17 executing program 0 (fault-call:9 fault-nth:41): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2871.017502][ T4649] ? __fget_files+0x288/0x3d0 [ 2871.017520][ T4649] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2871.017537][ T4649] ? loop_lookup+0x1d0/0x1d0 [ 2871.017554][ T4649] __x64_sys_ioctl+0x193/0x200 [ 2871.017572][ T4649] do_syscall_64+0x35/0xb0 [ 2871.017588][ T4649] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2871.017608][ T4649] RIP: 0033:0x4665d9 [ 2871.017620][ T4649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2871.017635][ T4649] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2871.017652][ T4649] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 2871.017662][ T4649] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2871.017672][ T4649] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 [ 2871.017681][ T4649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2871.017691][ T4649] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 10:28:17 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000fec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2871.061768][ T4649] "mq-deadline" elevator initialization failed, falling back to "none" [ 2871.062916][ T4647] EXT4-fs (loop4): Invalid log block size: 12058624 10:28:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000fac000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000360000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2871.325590][ T4661] FAULT_INJECTION: forcing a failure. [ 2871.325590][ T4661] name failslab, interval 1, probability 0, space 0, times 0 [ 2871.357202][ T4661] CPU: 1 PID: 4661 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2871.366517][ T4672] loop1: detected capacity change from 0 to 1054 [ 2871.366933][ T4661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2871.366944][ T4661] Call Trace: [ 2871.366952][ T4661] dump_stack_lvl+0xcd/0x134 [ 2871.366982][ T4661] should_fail.cold+0x5/0xa [ 2871.376083][ T4672] EXT4-fs (loop1): Invalid log cluster size: 12646912 [ 2871.383304][ T4661] ? sbitmap_queue_init_node+0x1d8/0x480 [ 2871.383334][ T4661] should_failslab+0x5/0x10 [ 2871.383355][ T4661] kmem_cache_alloc_node_trace+0x59/0x400 [ 2871.383376][ T4661] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2871.424404][ T4661] sbitmap_queue_init_node+0x1d8/0x480 [ 2871.429990][ T4661] blk_mq_init_bitmaps+0x87/0x180 [ 2871.435019][ T4661] blk_mq_init_tags+0x1a2/0x2a0 [ 2871.439877][ T4661] blk_mq_alloc_rq_map+0x58/0x1d0 [ 2871.444910][ T4661] ? blk_mq_queue_inflight+0xa0/0xa0 [ 2871.450203][ T4661] blk_mq_init_sched+0x22a/0x1130 [ 2871.451765][ T4673] loop5: detected capacity change from 0 to 1030 [ 2871.455233][ T4661] ? blk_queue_flag_set+0x22/0x30 [ 2871.455270][ T4661] elevator_init_mq+0x39d/0x480 [ 2871.465561][ T4673] EXT4-fs (loop5): Invalid log cluster size: 13824 [ 2871.466578][ T4661] __device_add_disk+0x5b9/0xd10 [ 2871.466608][ T4661] loop_add+0x68f/0x8f0 [ 2871.466635][ T4661] loop_control_ioctl+0x16c/0x480 [ 2871.492140][ T4661] ? loop_lookup+0x1d0/0x1d0 [ 2871.496716][ T4661] ? __fget_files+0x288/0x3d0 [ 2871.501378][ T4661] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2871.507600][ T4661] ? loop_lookup+0x1d0/0x1d0 [ 2871.512179][ T4661] __x64_sys_ioctl+0x193/0x200 [ 2871.516944][ T4661] do_syscall_64+0x35/0xb0 [ 2871.521584][ T4661] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2871.527666][ T4661] RIP: 0033:0x4665d9 [ 2871.531556][ T4661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2871.551146][ T4661] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2871.559538][ T4661] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 2871.567574][ T4661] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000ffc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:17 executing program 0 (fault-call:9 fault-nth:42): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001fce000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2871.575736][ T4661] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 [ 2871.583687][ T4661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2871.591640][ T4661] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 [ 2871.606807][ T4661] "mq-deadline" elevator initialization failed, falling back to "none" 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001fce100000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2871.684095][ T4647] loop4: detected capacity change from 0 to 1062 [ 2871.686350][ T4672] loop1: detected capacity change from 0 to 1054 [ 2871.697656][ T4647] EXT4-fs (loop4): Invalid log block size: 12058624 [ 2871.699739][ T4673] loop5: detected capacity change from 0 to 1030 10:28:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000003ba0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:18 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2871.728208][ T4672] EXT4-fs (loop1): Invalid log cluster size: 12646912 [ 2871.742906][ T4673] EXT4-fs (loop5): Invalid log cluster size: 13824 10:28:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001360000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000fbc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001fce200000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2871.810985][ T4697] FAULT_INJECTION: forcing a failure. [ 2871.810985][ T4697] name failslab, interval 1, probability 0, space 0, times 0 [ 2871.851392][ T4697] CPU: 1 PID: 4697 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2871.858436][ T4706] loop4: detected capacity change from 0 to 1062 [ 2871.861216][ T4697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2871.861228][ T4697] Call Trace: [ 2871.861235][ T4697] dump_stack_lvl+0xcd/0x134 [ 2871.861265][ T4697] should_fail.cold+0x5/0xa [ 2871.861288][ T4697] ? blk_mq_alloc_rq_map+0x98/0x1d0 [ 2871.861314][ T4697] should_failslab+0x5/0x10 [ 2871.861335][ T4697] __kmalloc_node+0x75/0x380 [ 2871.885308][ T4706] EXT4-fs (loop4): Invalid log block size: 12190464 [ 2871.885532][ T4697] ? blk_mq_init_tags+0x114/0x2a0 [ 2871.909858][ T4712] loop5: detected capacity change from 0 to 1030 [ 2871.910973][ T4697] blk_mq_alloc_rq_map+0x98/0x1d0 [ 2871.911005][ T4697] ? blk_mq_queue_inflight+0xa0/0xa0 [ 2871.932396][ T4712] EXT4-fs (loop5): Invalid log cluster size: 13825 [ 2871.932550][ T4697] blk_mq_init_sched+0x22a/0x1130 [ 2871.932578][ T4697] ? blk_queue_flag_set+0x22/0x30 [ 2871.949051][ T4697] elevator_init_mq+0x39d/0x480 [ 2871.953908][ T4697] __device_add_disk+0x5b9/0xd10 [ 2871.958938][ T4697] loop_add+0x68f/0x8f0 [ 2871.963099][ T4697] loop_control_ioctl+0x16c/0x480 [ 2871.968125][ T4697] ? loop_lookup+0x1d0/0x1d0 [ 2871.972710][ T4697] ? __fget_files+0x288/0x3d0 [ 2871.977376][ T4697] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2871.983603][ T4697] ? loop_lookup+0x1d0/0x1d0 [ 2871.988180][ T4697] __x64_sys_ioctl+0x193/0x200 [ 2871.992932][ T4697] do_syscall_64+0x35/0xb0 [ 2871.997334][ T4697] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2872.003219][ T4697] RIP: 0033:0x4665d9 [ 2872.007094][ T4697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2872.026683][ T4697] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2872.035080][ T4697] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2872.043059][ T4697] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 10:28:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002360000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2872.051012][ T4697] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2872.058969][ T4697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2872.066921][ T4697] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001fce300000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2872.117299][ T4717] loop1: detected capacity change from 0 to 1054 [ 2872.135207][ T4717] EXT4-fs (loop1): Invalid log cluster size: 12647168 [ 2872.143081][ T4697] "mq-deadline" elevator initialization failed, falling back to "none" [ 2872.165822][ T4722] loop5: detected capacity change from 0 to 1030 [ 2872.180071][ T4706] loop4: detected capacity change from 0 to 1062 [ 2872.181787][ T4717] loop1: detected capacity change from 0 to 1054 10:28:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001fce400000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:18 executing program 0 (fault-call:9 fault-nth:43): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000003c00004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2872.217017][ T4717] EXT4-fs (loop1): Invalid log cluster size: 12647168 [ 2872.226670][ T4722] EXT4-fs (loop5): Invalid log cluster size: 13826 10:28:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000fcc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2872.291112][ T4722] loop5: detected capacity change from 0 to 1030 [ 2872.327048][ T4743] loop1: detected capacity change from 0 to 1054 [ 2872.331120][ T4722] EXT4-fs (loop5): Invalid log cluster size: 13826 10:28:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000def200000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2872.341067][ T4743] EXT4-fs (loop1): Invalid log cluster size: 12647424 10:28:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003360000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2872.396408][ T4744] FAULT_INJECTION: forcing a failure. [ 2872.396408][ T4744] name failslab, interval 1, probability 0, space 0, times 0 [ 2872.436949][ T4742] loop4: detected capacity change from 0 to 1062 [ 2872.445638][ T4742] EXT4-fs (loop4): Invalid log block size: 12583680 [ 2872.450865][ T4744] CPU: 0 PID: 4744 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2872.462576][ T4744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2872.472624][ T4744] Call Trace: [ 2872.475897][ T4744] dump_stack_lvl+0xcd/0x134 [ 2872.480492][ T4744] should_fail.cold+0x5/0xa [ 2872.484995][ T4744] ? blk_mq_alloc_rq_map+0xd9/0x1d0 [ 2872.490196][ T4744] should_failslab+0x5/0x10 [ 2872.494701][ T4744] __kmalloc_node+0x75/0x380 [ 2872.499293][ T4744] blk_mq_alloc_rq_map+0xd9/0x1d0 [ 2872.504318][ T4744] ? blk_mq_queue_inflight+0xa0/0xa0 [ 2872.509610][ T4744] blk_mq_init_sched+0x22a/0x1130 [ 2872.514626][ T4744] ? blk_queue_flag_set+0x22/0x30 [ 2872.519649][ T4744] elevator_init_mq+0x39d/0x480 [ 2872.524509][ T4744] __device_add_disk+0x5b9/0xd10 [ 2872.529457][ T4744] loop_add+0x68f/0x8f0 [ 2872.533620][ T4744] loop_control_ioctl+0x16c/0x480 [ 2872.538660][ T4744] ? loop_lookup+0x1d0/0x1d0 [ 2872.543250][ T4744] ? __fget_files+0x288/0x3d0 [ 2872.547925][ T4744] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2872.554165][ T4744] ? loop_lookup+0x1d0/0x1d0 [ 2872.558757][ T4744] __x64_sys_ioctl+0x193/0x200 [ 2872.563523][ T4744] do_syscall_64+0x35/0xb0 [ 2872.567937][ T4744] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2872.573833][ T4744] RIP: 0033:0x4665d9 [ 2872.577719][ T4744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2872.597321][ T4744] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2872.605736][ T4744] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2872.613701][ T4744] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2872.621664][ T4744] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2872.629630][ T4744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:28:18 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000fdc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2872.637596][ T4744] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2872.660619][ T4751] loop5: detected capacity change from 0 to 1030 10:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000def300000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000edc00004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2872.687394][ T4744] "mq-deadline" elevator initialization failed, falling back to "none" [ 2872.721631][ T4751] EXT4-fs (loop5): Invalid log cluster size: 13827 [ 2872.726451][ T4759] loop1: detected capacity change from 0 to 1054 10:28:19 executing program 0 (fault-call:9 fault-nth:44): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 2872.774727][ T4759] EXT4-fs (loop1): Invalid log cluster size: 12647680 [ 2872.797823][ T4769] loop4: detected capacity change from 0 to 1062 [ 2872.810172][ T4751] loop5: detected capacity change from 0 to 1030 10:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000def400000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:19 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2872.830841][ T4751] EXT4-fs (loop5): Invalid log cluster size: 13827 [ 2872.842059][ T4759] loop1: detected capacity change from 0 to 1054 [ 2872.853787][ T4769] EXT4-fs (loop4): Invalid log block size: 12643584 [ 2872.866028][ T4759] EXT4-fs (loop1): Invalid log cluster size: 12647680 10:28:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000370000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000fec000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2872.942061][ T4769] loop4: detected capacity change from 0 to 1062 [ 2872.948816][ T4778] FAULT_INJECTION: forcing a failure. [ 2872.948816][ T4778] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2872.964642][ T4769] EXT4-fs (loop4): Invalid log block size: 12643584 [ 2872.979910][ T4778] CPU: 0 PID: 4778 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2872.989634][ T4778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2872.999683][ T4778] Call Trace: [ 2873.002956][ T4778] dump_stack_lvl+0xcd/0x134 [ 2873.007555][ T4778] should_fail.cold+0x5/0xa [ 2873.007617][ T4795] loop5: detected capacity change from 0 to 1030 [ 2873.012055][ T4778] prepare_alloc_pages+0x17b/0x580 [ 2873.012085][ T4778] __alloc_pages+0x12f/0x500 [ 2873.012108][ T4778] ? lock_acquire+0x442/0x510 [ 2873.012127][ T4778] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 10:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2873.029346][ T4795] EXT4-fs (loop5): Invalid log cluster size: 14080 [ 2873.032720][ T4778] ? lock_release+0x720/0x720 [ 2873.032749][ T4778] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2873.056986][ T4778] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2873.063226][ T4778] ? __cpu_to_node+0x82/0xb0 [ 2873.067899][ T4778] ? blk_mq_hw_queue_to_node+0xe8/0x140 [ 2873.073449][ T4778] blk_mq_alloc_rqs+0x258/0x7a0 [ 2873.078310][ T4778] ? blk_mq_queue_inflight+0xa0/0xa0 [ 2873.083592][ T4778] blk_mq_init_sched+0x27e/0x1130 [ 2873.088616][ T4778] elevator_init_mq+0x39d/0x480 [ 2873.093466][ T4778] __device_add_disk+0x5b9/0xd10 [ 2873.098400][ T4778] loop_add+0x68f/0x8f0 [ 2873.102550][ T4778] loop_control_ioctl+0x16c/0x480 [ 2873.107577][ T4778] ? loop_lookup+0x1d0/0x1d0 [ 2873.112165][ T4778] ? __fget_files+0x288/0x3d0 [ 2873.116843][ T4778] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2873.123088][ T4778] ? loop_lookup+0x1d0/0x1d0 [ 2873.127674][ T4778] __x64_sys_ioctl+0x193/0x200 [ 2873.132436][ T4778] do_syscall_64+0x35/0xb0 [ 2873.136939][ T4778] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2873.142834][ T4778] RIP: 0033:0x4665d9 [ 2873.146817][ T4778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2873.166428][ T4778] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2873.174835][ T4778] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2873.182807][ T4778] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 10:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2873.190771][ T4778] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2873.198735][ T4778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2873.206699][ T4778] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2873.231834][ T4801] loop1: detected capacity change from 0 to 1054 10:28:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000002cc0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:19 executing program 0 (fault-call:9 fault-nth:45): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000ffc000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2873.289057][ T4795] loop5: detected capacity change from 0 to 1030 [ 2873.305514][ T4801] EXT4-fs (loop1): Invalid log cluster size: 12647936 [ 2873.315580][ T4795] EXT4-fs (loop5): Invalid log cluster size: 14080 10:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000005000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001370000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:19 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000006000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2873.388506][ T4816] loop4: detected capacity change from 0 to 1062 [ 2873.404458][ T4814] FAULT_INJECTION: forcing a failure. [ 2873.404458][ T4814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2873.418108][ T4816] EXT4-fs (loop4): Invalid log block size: 13369856 [ 2873.465570][ T4814] CPU: 0 PID: 4814 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2873.475391][ T4814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2873.485437][ T4814] Call Trace: [ 2873.488704][ T4814] dump_stack_lvl+0xcd/0x134 [ 2873.493290][ T4814] should_fail.cold+0x5/0xa [ 2873.497781][ T4814] prepare_alloc_pages+0x17b/0x580 [ 2873.502881][ T4814] ? sbitmap_queue_init_node+0x28b/0x480 [ 2873.508501][ T4814] __alloc_pages+0x12f/0x500 [ 2873.513081][ T4814] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 2873.519835][ T4814] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2873.525978][ T4814] ? trace_hardirqs_on+0x5b/0x1c0 [ 2873.530989][ T4814] ? blk_mq_alloc_rqs+0x4b3/0x7a0 [ 2873.536092][ T4814] ? blk_mq_alloc_rqs+0x4c2/0x7a0 [ 2873.541103][ T4814] blk_mq_alloc_rqs+0x258/0x7a0 [ 2873.545948][ T4814] blk_mq_init_sched+0x27e/0x1130 [ 2873.550959][ T4814] elevator_init_mq+0x39d/0x480 [ 2873.555799][ T4814] __device_add_disk+0x5b9/0xd10 [ 2873.560744][ T4814] loop_add+0x68f/0x8f0 [ 2873.564888][ T4814] loop_control_ioctl+0x16c/0x480 [ 2873.569900][ T4814] ? loop_lookup+0x1d0/0x1d0 [ 2873.574475][ T4814] ? __fget_files+0x288/0x3d0 [ 2873.579137][ T4814] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2873.585362][ T4814] ? loop_lookup+0x1d0/0x1d0 [ 2873.589938][ T4814] __x64_sys_ioctl+0x193/0x200 [ 2873.594688][ T4814] do_syscall_64+0x35/0xb0 [ 2873.599091][ T4814] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2873.604973][ T4814] RIP: 0033:0x4665d9 [ 2873.608846][ T4814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2873.628529][ T4814] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2873.636928][ T4814] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2873.644968][ T4814] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2873.652923][ T4814] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2873.660874][ T4814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2873.668830][ T4814] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 10:28:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000007000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2873.713510][ T4832] loop5: detected capacity change from 0 to 1030 [ 2873.714667][ T4831] loop1: detected capacity change from 0 to 1054 [ 2873.724002][ T4832] EXT4-fs (loop5): Invalid log cluster size: 14081 [ 2873.746222][ T4831] EXT4-fs (loop1): Invalid log cluster size: 12648192 [ 2873.770908][ T4816] loop4: detected capacity change from 0 to 1062 [ 2873.783820][ T4832] loop5: detected capacity change from 0 to 1030 [ 2873.793616][ T4831] loop1: detected capacity change from 0 to 1054 [ 2873.800206][ T4832] EXT4-fs (loop5): Invalid log cluster size: 14081 10:28:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000008000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000009000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:20 executing program 0 (fault-call:9 fault-nth:46): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002370000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2873.815969][ T4831] EXT4-fs (loop1): Invalid log cluster size: 12648192 [ 2873.827646][ T4816] EXT4-fs (loop4): Invalid log block size: 13369856 10:28:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000002e00004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000012fd400000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000a000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2873.943387][ T4858] FAULT_INJECTION: forcing a failure. [ 2873.943387][ T4858] name failslab, interval 1, probability 0, space 0, times 0 [ 2873.954969][ T4863] loop5: detected capacity change from 0 to 1030 [ 2873.959929][ T4861] loop4: detected capacity change from 0 to 1062 [ 2873.971121][ T4863] EXT4-fs (loop5): Invalid log cluster size: 14082 [ 2873.976179][ T4867] loop1: detected capacity change from 0 to 1054 [ 2873.992881][ T4861] EXT4-fs (loop4): Invalid log block size: 14680576 [ 2874.006088][ T4858] CPU: 1 PID: 4858 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2874.015801][ T4858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2874.025837][ T4858] Call Trace: [ 2874.029114][ T4858] dump_stack_lvl+0xcd/0x134 [ 2874.033714][ T4858] should_fail.cold+0x5/0xa [ 2874.038219][ T4858] ? elevator_alloc+0x78/0x170 10:28:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000c000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000000f000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2874.038401][ T4867] EXT4-fs (loop1): Invalid log cluster size: 13905665 [ 2874.042981][ T4858] should_failslab+0x5/0x10 [ 2874.043006][ T4858] kmem_cache_alloc_node_trace+0x59/0x400 [ 2874.043029][ T4858] ? trace_hardirqs_on+0x51/0x1c0 [ 2874.065030][ T4858] elevator_alloc+0x78/0x170 [ 2874.069627][ T4858] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2874.075873][ T4858] dd_init_sched+0x45/0x640 [ 2874.080386][ T4858] blk_mq_init_sched+0x658/0x1130 [ 2874.085415][ T4858] elevator_init_mq+0x39d/0x480 [ 2874.090253][ T4858] __device_add_disk+0x5b9/0xd10 [ 2874.095190][ T4858] loop_add+0x68f/0x8f0 [ 2874.099338][ T4858] loop_control_ioctl+0x16c/0x480 [ 2874.104453][ T4858] ? loop_lookup+0x1d0/0x1d0 [ 2874.109047][ T4858] ? __fget_files+0x288/0x3d0 [ 2874.113728][ T4858] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2874.119964][ T4858] ? loop_lookup+0x1d0/0x1d0 [ 2874.124538][ T4858] __x64_sys_ioctl+0x193/0x200 [ 2874.129288][ T4858] do_syscall_64+0x35/0xb0 [ 2874.133696][ T4858] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2874.139580][ T4858] RIP: 0033:0x4665d9 [ 2874.143454][ T4858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2874.163129][ T4858] RSP: 002b:00007fee1b875188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2874.171521][ T4858] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2874.179471][ T4858] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2874.187583][ T4858] RBP: 00007fee1b8751d0 R08: 0000000000000000 R09: 0000000000000000 [ 2874.195534][ T4858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2874.203487][ T4858] R13: 00007ffe2c09936f R14: 00007fee1b875300 R15: 0000000000022000 [ 2874.217138][ T4858] "mq-deadline" elevator initialization failed, falling back to "none" [ 2874.241165][ T4863] loop5: detected capacity change from 0 to 1030 [ 2874.272459][ T4867] loop1: detected capacity change from 0 to 1054 [ 2874.279224][ T4863] EXT4-fs (loop5): Invalid log cluster size: 14082 [ 2874.279608][ T4861] loop4: detected capacity change from 0 to 1062 [ 2874.304979][ T4861] EXT4-fs (loop4): Invalid log block size: 14680576 [ 2874.305082][ T4867] EXT4-fs (loop1): Invalid log cluster size: 13905665 10:28:20 executing program 0 (fault-call:9 fault-nth:47): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000010000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000ffffffe20004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003370000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:20 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:28:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000012fd500000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2874.604153][ T4896] loop1: detected capacity change from 0 to 1054 [ 2874.615370][ T4899] loop4: detected capacity change from 0 to 1062 [ 2874.619538][ T4901] loop5: detected capacity change from 0 to 1030 10:28:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000012000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2874.651295][ T4899] EXT4-fs (loop4): Invalid log block size: 14876671 [ 2874.655651][ T4901] EXT4-fs (loop5): Invalid log cluster size: 14083 [ 2874.672851][ T4896] EXT4-fs (loop1): Invalid log cluster size: 13971201 [ 2874.696106][ T4899] loop4: detected capacity change from 0 to 1062 [ 2874.702767][ T4908] FAULT_INJECTION: forcing a failure. [ 2874.702767][ T4908] name failslab, interval 1, probability 0, space 0, times 0 [ 2874.721044][ T4899] EXT4-fs (loop4): Invalid log block size: 14876671 [ 2874.743832][ T4908] CPU: 1 PID: 4908 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2874.753570][ T4908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2874.763708][ T4908] Call Trace: [ 2874.766981][ T4908] dump_stack_lvl+0xcd/0x134 [ 2874.771573][ T4908] should_fail.cold+0x5/0xa [ 2874.776163][ T4908] ? elevator_alloc+0x78/0x170 [ 2874.781184][ T4908] should_failslab+0x5/0x10 [ 2874.785686][ T4908] kmem_cache_alloc_node_trace+0x59/0x400 [ 2874.791493][ T4908] elevator_alloc+0x78/0x170 [ 2874.796116][ T4908] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2874.802354][ T4908] dd_init_sched+0x45/0x640 [ 2874.806862][ T4908] blk_mq_init_sched+0x658/0x1130 [ 2874.811890][ T4908] elevator_init_mq+0x39d/0x480 [ 2874.816738][ T4908] __device_add_disk+0x5b9/0xd10 [ 2874.821676][ T4908] loop_add+0x68f/0x8f0 [ 2874.825834][ T4908] loop_control_ioctl+0x16c/0x480 [ 2874.830866][ T4908] ? loop_lookup+0x1d0/0x1d0 [ 2874.835456][ T4908] ? __fget_files+0x288/0x3d0 [ 2874.840305][ T4908] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2874.846546][ T4908] ? loop_lookup+0x1d0/0x1d0 [ 2874.851133][ T4908] __x64_sys_ioctl+0x193/0x200 [ 2874.855920][ T4908] do_syscall_64+0x35/0xb0 [ 2874.860340][ T4908] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2874.866233][ T4908] RIP: 0033:0x4665d9 [ 2874.870119][ T4908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2874.889979][ T4908] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2874.898562][ T4908] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 2874.906527][ T4908] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2874.914924][ T4908] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 [ 2874.922976][ T4908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2874.931138][ T4908] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 [ 2874.954243][ T4908] "mq-deadline" elevator initialization failed, falling back to "none" [ 2874.971568][ T4901] loop5: detected capacity change from 0 to 1030 [ 2874.975953][T16645] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2874.978651][ T4896] loop1: detected capacity change from 0 to 1054 10:28:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000ffffffe40004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000014000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2875.004282][ T4901] EXT4-fs (loop5): Invalid log cluster size: 14083 [ 2875.021924][ T4896] EXT4-fs (loop1): Invalid log cluster size: 13971201 10:28:21 executing program 0 (fault-call:9 fault-nth:48): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000efde00000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000380000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2875.070740][ T4921] loop4: detected capacity change from 0 to 1062 [ 2875.097689][ T4921] EXT4-fs (loop4): Invalid log block size: 15007743 10:28:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000035000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2875.167477][ T4931] loop1: detected capacity change from 0 to 1054 [ 2875.190820][ T4934] loop5: detected capacity change from 0 to 1030 [ 2875.192657][ T4931] EXT4-fs (loop1): Invalid log cluster size: 14610176 [ 2875.198601][ T4921] loop4: detected capacity change from 0 to 1062 [ 2875.224003][ T4939] FAULT_INJECTION: forcing a failure. [ 2875.224003][ T4939] name failslab, interval 1, probability 0, space 0, times 0 [ 2875.236769][ T4939] CPU: 0 PID: 4939 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2875.246480][ T4939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2875.256528][ T4939] Call Trace: [ 2875.259799][ T4939] dump_stack_lvl+0xcd/0x134 [ 2875.264397][ T4939] should_fail.cold+0x5/0xa [ 2875.268901][ T4939] ? blkcg_activate_policy+0x232/0xba0 [ 2875.271860][ T4921] EXT4-fs (loop4): Invalid log block size: 15007743 [ 2875.274542][ T4939] should_failslab+0x5/0x10 [ 2875.281243][ T4934] EXT4-fs (loop5): Invalid log cluster size: 14336 [ 2875.285578][ T4939] kmem_cache_alloc_trace+0x55/0x3c0 [ 2875.297308][ T4939] ? dd_cpd_free+0x40/0x40 [ 2875.301730][ T4939] blkcg_activate_policy+0x232/0xba0 [ 2875.307047][ T4939] dd_init_sched+0x429/0x640 [ 2875.311646][ T4939] blk_mq_init_sched+0x658/0x1130 [ 2875.316679][ T4939] elevator_init_mq+0x39d/0x480 [ 2875.321533][ T4939] __device_add_disk+0x5b9/0xd10 [ 2875.326473][ T4939] loop_add+0x68f/0x8f0 [ 2875.330720][ T4939] loop_control_ioctl+0x16c/0x480 [ 2875.335832][ T4939] ? loop_lookup+0x1d0/0x1d0 [ 2875.340422][ T4939] ? __fget_files+0x288/0x3d0 [ 2875.345188][ T4939] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2875.351425][ T4939] ? loop_lookup+0x1d0/0x1d0 [ 2875.356015][ T4939] __x64_sys_ioctl+0x193/0x200 [ 2875.360766][ T4939] do_syscall_64+0x35/0xb0 [ 2875.365166][ T4939] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2875.371049][ T4939] RIP: 0033:0x4665d9 [ 2875.374927][ T4939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2875.395584][ T4939] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2875.404405][ T4939] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 2875.412536][ T4939] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 10:28:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000003c000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2875.420726][ T4939] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 [ 2875.428675][ T4939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2875.436627][ T4939] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 10:28:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000002e80004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:21 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2875.472431][ T4931] loop1: detected capacity change from 0 to 1054 [ 2875.489241][ T4931] EXT4-fs (loop1): Invalid log cluster size: 14610176 [ 2875.499244][ T4934] loop5: detected capacity change from 0 to 1030 10:28:21 executing program 0 (fault-call:9 fault-nth:49): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) pipe(&(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 10:28:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000001380000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000efdf00000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2875.525279][ T4934] EXT4-fs (loop5): Invalid log cluster size: 14336 10:28:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d000000000000000000005c000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2875.637443][ T4968] loop5: detected capacity change from 0 to 1030 [ 2875.645047][ T4963] loop4: detected capacity change from 0 to 1062 [ 2875.645928][ T4969] loop1: detected capacity change from 0 to 1054 [ 2875.663249][ T4968] EXT4-fs (loop5): Invalid log cluster size: 14337 [ 2875.670879][ T4963] EXT4-fs (loop4): Invalid log block size: 15204864 [ 2875.677796][ T4969] EXT4-fs (loop1): Invalid log cluster size: 14675712 10:28:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000067000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x84d01, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000fffffff50004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) 10:28:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d00000000000000000000fe000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2875.708385][ T4976] FAULT_INJECTION: forcing a failure. [ 2875.708385][ T4976] name failslab, interval 1, probability 0, space 0, times 0 [ 2875.732020][ T4968] loop5: detected capacity change from 0 to 1030 [ 2875.750112][ T4969] loop1: detected capacity change from 0 to 1054 [ 2875.773792][ T4969] EXT4-fs (loop1): Invalid log cluster size: 14675712 [ 2875.773989][ T4968] EXT4-fs (loop5): Invalid log cluster size: 14337 [ 2875.797239][ T4976] CPU: 1 PID: 4976 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2875.806967][ T4976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2875.817019][ T4976] Call Trace: [ 2875.820293][ T4976] dump_stack_lvl+0xcd/0x134 [ 2875.824887][ T4976] should_fail.cold+0x5/0xa [ 2875.829390][ T4976] ? device_create_groups_vargs+0x8a/0x280 [ 2875.835195][ T4976] should_failslab+0x5/0x10 [ 2875.839697][ T4976] kmem_cache_alloc_trace+0x55/0x3c0 [ 2875.844985][ T4976] device_create_groups_vargs+0x8a/0x280 [ 2875.850618][ T4976] device_create+0xdf/0x120 [ 2875.855118][ T4976] ? device_create_groups_vargs+0x280/0x280 [ 2875.861011][ T4976] ? pointer+0xa00/0xa00 [ 2875.865251][ T4976] ? lock_downgrade+0x6e0/0x6e0 [ 2875.870101][ T4976] ? rwlock_bug.part.0+0x90/0x90 [ 2875.875034][ T4976] ? vsnprintf+0x283/0x14f0 [ 2875.879713][ T4976] bdi_register_va.part.0+0x9c/0x800 [ 2875.885000][ T4976] ? trace_hardirqs_on+0x5b/0x1c0 [ 2875.890021][ T4976] ? cleanup_offline_cgwbs_workfn+0x700/0x700 [ 2875.896087][ T4976] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 2875.901901][ T4976] ? __wake_up_common_lock+0xde/0x130 [ 2875.907278][ T4976] bdi_register+0x12a/0x140 [ 2875.911776][ T4976] ? bdi_register_va.part.0+0x800/0x800 [ 2875.917326][ T4976] __device_add_disk+0x6fb/0xd10 [ 2875.922264][ T4976] loop_add+0x68f/0x8f0 [ 2875.926419][ T4976] loop_control_ioctl+0x16c/0x480 [ 2875.931443][ T4976] ? loop_lookup+0x1d0/0x1d0 [ 2875.936032][ T4976] ? __fget_files+0x288/0x3d0 [ 2875.940801][ T4976] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2875.947047][ T4976] ? loop_lookup+0x1d0/0x1d0 [ 2875.951639][ T4976] __x64_sys_ioctl+0x193/0x200 [ 2875.956403][ T4976] do_syscall_64+0x35/0xb0 [ 2875.960813][ T4976] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2875.966707][ T4976] RIP: 0033:0x4665d9 [ 2875.970595][ T4976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2875.990202][ T4976] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2875.998610][ T4976] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 2876.006572][ T4976] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2876.014538][ T4976] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 10:28:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002380000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2876.022501][ T4976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2876.030464][ T4976] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 10:28:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000002010000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2876.080678][ T4976] ------------[ cut here ]------------ [ 2876.086458][ T4976] WARNING: CPU: 1 PID: 4976 at block/genhd.c:523 __device_add_disk+0xb76/0xd10 [ 2876.097413][ T4976] Modules linked in: [ 2876.104144][ T4990] loop4: detected capacity change from 0 to 1062 [ 2876.117150][ T4989] loop5: detected capacity change from 0 to 1030 [ 2876.124347][ T4990] EXT4-fs (loop4): Invalid log block size: 16121855 10:28:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80004, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000003010000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2876.137205][ T4976] CPU: 0 PID: 4976 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2876.149939][ T4989] EXT4-fs (loop5): Invalid log cluster size: 14338 [ 2876.162418][ T4976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2876.163063][ T4990] loop4: detected capacity change from 0 to 1062 10:28:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x83c01, 0x6, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000003600000019016820600100000f2d0000000000000000000000efe800000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000cdf4655fddf4655fddf4655f00000000e5c700000800000010000800000000000af30200040000000000000000000000020000001d000000020000000400000032", 0x49, 0x1600}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2876.185503][ T4976] RIP: 0010:__device_add_disk+0xb76/0xd10 [ 2876.191635][ T4990] EXT4-fs (loop4): Invalid log block size: 16121855 [ 2876.200204][ T4976] Code: fb ff ff 4c 89 ef 89 44 24 28 e8 95 bb f9 fd 8b 44 24 28 e9 7a fb ff ff 4c 89 ef e8 14 bb f9 fd e9 e0 fb ff ff e8 6a fd b3 fd <0f> 0b e9 97 fb ff ff 4c 89 ff e8 2b bb f9 fd e9 b1 f6 ff ff 48 8b [ 2876.230056][ T4976] RSP: 0018:ffffc9000e44fd98 EFLAGS: 00010246 [ 2876.238455][ T4989] loop5: detected capacity change from 0 to 1030 [ 2876.251979][ T5002] loop1: detected capacity change from 0 to 1054 [ 2876.263264][ T4989] EXT4-fs (loop5): Invalid log cluster size: 14338 [ 2876.270818][ T4976] RAX: 0000000000040000 RBX: ffff8880a0a75800 RCX: ffffc900018e2000 [ 2876.273241][ T5002] EXT4-fs (loop1): Invalid log cluster size: 15265536 [ 2876.279106][ T4976] RDX: 0000000000040000 RSI: ffffffff83c18cc6 RDI: 0000000000000003 [ 2876.294836][ T4976] RBP: ffff888081e9d000 R08: 0000000000000000 R09: ffffffff8c2c0473 [ 2876.311668][ T4976] R10: ffffffff83c18858 R11: 0000000000000000 R12: 0000000000000001 [ 2876.323774][ T4976] R13: ffff8880a0a75c9c R14: ffff888081e9d0a0 R15: 0000000000000000 [ 2876.331680][ T5002] loop1: detected capacity change from 0 to 1054 [ 2876.338869][ T4976] FS: 00007fee1b854700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 2876.343983][ T5002] EXT4-fs (loop1): Invalid log cluster size: 15265536 [ 2876.354283][ T4976] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2876.361543][ T4976] CR2: 00007f7dad8792c8 CR3: 000000009f156000 CR4: 0000000000350ee0 [ 2876.370690][ T4976] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2876.378929][ T4976] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 2876.389585][ T4976] Call Trace: [ 2876.392948][ T4976] loop_add+0x68f/0x8f0 [ 2876.397199][ T4976] loop_control_ioctl+0x16c/0x480 [ 2876.405093][ T4976] ? loop_lookup+0x1d0/0x1d0 [ 2876.410686][ T4976] ? __fget_files+0x288/0x3d0 [ 2876.415553][ T4976] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2876.424729][ T4976] ? loop_lookup+0x1d0/0x1d0 [ 2876.430303][ T4976] __x64_sys_ioctl+0x193/0x200 [ 2876.435159][ T4976] do_syscall_64+0x35/0xb0 [ 2876.442285][ T4976] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2876.448307][ T4976] RIP: 0033:0x4665d9 [ 2876.466606][ T4976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:28:22 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x200) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c70, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0xb818, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2876.488723][ T4976] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2876.511281][ T4976] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 2876.536566][ T4976] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2876.552158][ T4976] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 [ 2876.563837][ T4976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2876.578264][ T4976] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 [ 2876.588313][ T4976] Kernel panic - not syncing: panic_on_warn set ... [ 2876.594894][ T4976] CPU: 1 PID: 4976 Comm: syz-executor.0 Tainted: G W 5.13.0-syzkaller #0 [ 2876.604608][ T4976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2876.614657][ T4976] Call Trace: [ 2876.617927][ T4976] dump_stack_lvl+0xcd/0x134 [ 2876.622520][ T4976] panic+0x306/0x73d [ 2876.626421][ T4976] ? __warn_printk+0xf3/0xf3 [ 2876.631018][ T4976] ? __warn.cold+0x1a/0x44 [ 2876.635439][ T4976] ? __device_add_disk+0xb76/0xd10 [ 2876.640554][ T4976] __warn.cold+0x35/0x44 [ 2876.644800][ T4976] ? __device_add_disk+0xb76/0xd10 [ 2876.650004][ T4976] report_bug+0x1bd/0x210 [ 2876.654328][ T4976] handle_bug+0x3c/0x60 [ 2876.658477][ T4976] exc_invalid_op+0x14/0x40 [ 2876.662975][ T4976] asm_exc_invalid_op+0x12/0x20 [ 2876.667825][ T4976] RIP: 0010:__device_add_disk+0xb76/0xd10 [ 2876.673551][ T4976] Code: fb ff ff 4c 89 ef 89 44 24 28 e8 95 bb f9 fd 8b 44 24 28 e9 7a fb ff ff 4c 89 ef e8 14 bb f9 fd e9 e0 fb ff ff e8 6a fd b3 fd <0f> 0b e9 97 fb ff ff 4c 89 ff e8 2b bb f9 fd e9 b1 f6 ff ff 48 8b [ 2876.693245][ T4976] RSP: 0018:ffffc9000e44fd98 EFLAGS: 00010246 [ 2876.699312][ T4976] RAX: 0000000000040000 RBX: ffff8880a0a75800 RCX: ffffc900018e2000 [ 2876.707365][ T4976] RDX: 0000000000040000 RSI: ffffffff83c18cc6 RDI: 0000000000000003 [ 2876.715333][ T4976] RBP: ffff888081e9d000 R08: 0000000000000000 R09: ffffffff8c2c0473 [ 2876.723297][ T4976] R10: ffffffff83c18858 R11: 0000000000000000 R12: 0000000000000001 [ 2876.731260][ T4976] R13: ffff8880a0a75c9c R14: ffff888081e9d0a0 R15: 0000000000000000 [ 2876.739229][ T4976] ? __device_add_disk+0x708/0xd10 [ 2876.744353][ T4976] ? __device_add_disk+0xb76/0xd10 [ 2876.749472][ T4976] ? __device_add_disk+0xb76/0xd10 [ 2876.754586][ T4976] loop_add+0x68f/0x8f0 [ 2876.758745][ T4976] loop_control_ioctl+0x16c/0x480 [ 2876.763770][ T4976] ? loop_lookup+0x1d0/0x1d0 [ 2876.768354][ T4976] ? __fget_files+0x288/0x3d0 [ 2876.773036][ T4976] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2876.779276][ T4976] ? loop_lookup+0x1d0/0x1d0 [ 2876.783869][ T4976] __x64_sys_ioctl+0x193/0x200 [ 2876.788717][ T4976] do_syscall_64+0x35/0xb0 [ 2876.793133][ T4976] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2876.799029][ T4976] RIP: 0033:0x4665d9 [ 2876.802912][ T4976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2876.822519][ T4976] RSP: 002b:00007fee1b854188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2876.830930][ T4976] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 2876.838894][ T4976] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 2876.846856][ T4976] RBP: 00007fee1b8541d0 R08: 0000000000000000 R09: 0000000000000000 [ 2876.854828][ T4976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2876.862791][ T4976] R13: 00007ffe2c09936f R14: 00007fee1b854300 R15: 0000000000022000 [ 2876.876796][ T4976] Kernel Offset: disabled [ 2876.881111][ T4976] Rebooting in 86400 seconds..