on=80000021 qualification=0000000000000000 [ 666.625293] IDTVectoring: info=00000000 errcode=00000000 [ 666.631307] TSC Offset = 0xfffffe9809ccf690 [ 666.635890] EPT pointer = 0x000000009545101e [ 666.697426] EXT4-fs (loop3): Invalid log block size: 64 [ 667.141377] device bridge_slave_1 left promiscuous mode [ 667.148154] bridge0: port 2(bridge_slave_1) entered disabled state [ 667.200914] device bridge_slave_0 left promiscuous mode [ 667.220222] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.429612] device hsr_slave_1 left promiscuous mode [ 667.491365] device hsr_slave_0 left promiscuous mode [ 667.549972] team0 (unregistering): Port device team_slave_1 removed [ 667.568613] team0 (unregistering): Port device team_slave_0 removed [ 667.587205] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 667.631334] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 667.745367] bond0 (unregistering): Released all slaves [ 668.657686] IPVS: ftp: loaded support on port[0] = 21 [ 668.857509] chnl_net:caif_netlink_parms(): no params data found [ 668.912469] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.918966] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.931516] device bridge_slave_0 entered promiscuous mode [ 668.938867] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.945261] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.958135] device bridge_slave_1 entered promiscuous mode [ 669.000686] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 669.030803] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 669.089202] team0: Port device team_slave_0 added [ 669.095507] team0: Port device team_slave_1 added [ 669.178449] device hsr_slave_0 entered promiscuous mode [ 669.215961] device hsr_slave_1 entered promiscuous mode [ 669.264520] bridge0: port 2(bridge_slave_1) entered blocking state [ 669.270916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 669.277659] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.284002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 669.392840] 8021q: adding VLAN 0 to HW filter on device bond0 [ 669.407327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 669.415037] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.422508] bridge0: port 2(bridge_slave_1) entered disabled state [ 669.430529] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 669.449375] 8021q: adding VLAN 0 to HW filter on device team0 [ 669.461948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 669.470261] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.476657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 669.498102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 669.510361] bridge0: port 2(bridge_slave_1) entered blocking state [ 669.516755] bridge0: port 2(bridge_slave_1) entered forwarding state [ 669.527897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 669.544277] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 669.554586] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 669.573835] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 669.582059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 669.606519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 669.614154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 669.661949] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 669.686435] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 00:55:26 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800004000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:26 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:55:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000fc000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200000, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000080)={0x6, 0x1, 0x84, 0x7, 0x9}, 0xc) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r4 = dup(r3) write$binfmt_elf64(r1, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x4e5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0x4) ioctl$PPPIOCSACTIVE(r4, 0x40107446, &(0x7f0000000200)={0x8, &(0x7f0000000180)=[{0x4, 0x2, 0x10000, 0x7}, {0x6, 0x0, 0x0, 0x73}, {0x401, 0x80, 0xffffffffffffff5b, 0x8}, {0x2ca, 0x100000000, 0xffffffff00000001, 0x6}, {0xfff, 0x2, 0x2}, {0x66, 0x7, 0xa, 0x40}, {0x100000001, 0x400, 0x4, 0x4}, {0xfff, 0x4ca, 0xffe, 0x9}]}) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 669.753955] EXT4-fs (loop1): Invalid log block size: 64 00:55:26 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xb000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 669.900621] EXT4-fs (loop4): Invalid log block size: 64 [ 669.906618] EXT4-fs (loop3): Invalid log block size: 64 [ 669.922381] kvm_hv_set_msr: 70 callbacks suppressed [ 669.922395] kvm [30219]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 669.932286] EXT4-fs (loop0): Invalid log block size: 64 [ 669.960146] kvm [30218]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 669.976120] kvm [30218]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 669.993318] kvm [30219]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 00:55:26 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:26 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800005000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 670.011572] kvm [30218]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 670.029685] kvm [30219]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 00:55:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000030100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 670.058537] kvm [30218]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 670.072382] kvm [30219]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 670.083157] kvm [30218]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 670.120850] kvm [30219]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 670.130968] EXT4-fs (loop3): Invalid log block size: 64 00:55:26 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x10040000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800010040100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 670.211399] EXT4-fs (loop4): Invalid log block size: 64 [ 670.235797] EXT4-fs (loop1): Invalid log block size: 64 00:55:26 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:26 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800006000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000040)=0x6c) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 670.331758] EXT4-fs (loop3): Invalid log block size: 64 00:55:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/kvm\x00', 0x3) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0, 0x0) ioctl$KVM_GET_FPU(r4, 0x81a0ae8c, &(0x7f00000001c0)) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 670.447834] EXT4-fs (loop3): Invalid log block size: 64 [ 670.451393] EXT4-fs (loop0): Invalid log block size: 64 [ 670.459465] EXT4-fs (loop4): Invalid log block size: 64 00:55:26 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:26 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800007000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = semget$private(0x0, 0x0, 0x80) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f00000001c0)=""/233) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 00:55:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000050100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:26 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) [ 670.712761] EXT4-fs (loop3): Invalid log block size: 64 00:55:27 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800008000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 670.836098] EXT4-fs (loop3): Invalid log block size: 64 [ 670.843244] EXT4-fs (loop0): Invalid log block size: 64 [ 670.848960] EXT4-fs (loop4): Invalid log block size: 64 00:55:27 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x40000, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f00000001c0)=@md5={0x1, "f5d6dbfa675bfc8ce553b1aecd66651d"}, 0x11, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 00:55:27 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:27 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800009000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000000001080000000000000dd090000000000000900000000000000"]) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) getpeername$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:55:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000060100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:27 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:27 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000a000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 671.093492] EXT4-fs (loop3): Invalid log block size: 64 00:55:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) gettid() ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000080)=0x5) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000040)={0x10001, {0x6, 0x80, 0xff, 0x2, 0x10000, 0x8}}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e4) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 671.193878] EXT4-fs (loop3): Invalid log block size: 64 [ 671.216151] EXT4-fs (loop0): Invalid log block size: 64 00:55:27 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000b000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 671.247095] EXT4-fs (loop4): Invalid log block size: 64 00:55:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000070100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:27 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000040)={0x1f000, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:55:27 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 671.354475] EXT4-fs (loop1): Invalid log block size: 64 00:55:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:55:27 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800023000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000090100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 671.506400] EXT4-fs (loop0): Invalid log block size: 64 [ 671.522364] EXT4-fs (loop3): Invalid log block size: 64 [ 671.530636] EXT4-fs (loop4): Invalid log block size: 64 00:55:27 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:55:27 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2d000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 671.703749] EXT4-fs (loop1): Invalid log block size: 64 00:55:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:55:28 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80002d000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 671.794119] EXT4-fs (loop0): Invalid log block size: 64 [ 671.802853] EXT4-fs (loop4): Invalid log block size: 64 00:55:28 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:28 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000a0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 671.917434] EXT4-fs (loop3): Invalid log block size: 64 [ 671.962835] *** Guest State *** [ 671.981289] EXT4-fs (loop1): Invalid log block size: 64 [ 671.998207] EXT4-fs (loop0): Invalid log block size: 64 [ 672.007274] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 672.016828] EXT4-fs (loop3): Invalid log block size: 64 [ 672.037894] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 672.061495] CR3 = 0x0000000000000000 [ 672.079812] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 00:55:28 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000b0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000040)={0x400000000000000, 0x1, 0x0, 0x1, 0x1d}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x44000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:55:28 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800048000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 672.109441] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 672.141950] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 00:55:28 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 672.153787] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 672.172694] EXT4-fs (loop4): Invalid log block size: 64 [ 672.183727] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 672.192096] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 00:55:28 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800004100100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 672.216900] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 00:55:28 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 672.275370] EXT4-fs (loop1): Invalid log block size: 64 [ 672.286664] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 00:55:28 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80004c000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 672.316186] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 672.335179] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 672.353967] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 672.362535] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 672.382279] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 672.396680] EXT4-fs (loop3): Invalid log block size: 64 [ 672.404669] EXT4-fs (loop0): Invalid log block size: 64 [ 672.410154] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 672.428746] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 672.447608] Interruptibility = 00000000 ActivityState = 00000000 00:55:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x4) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 672.472549] *** Host State *** [ 672.483106] RIP = 0xffffffff811b3210 RSP = 0xffff88808b8978b8 [ 672.499819] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 672.508108] FSBase=00007ff3fd527700 GSBase=ffff8880ae900000 TRBase=fffffe0000033000 [ 672.516608] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 672.523867] EXT4-fs (loop4): Invalid log block size: 64 [ 672.534177] EXT4-fs (loop1): Invalid log block size: 64 [ 672.540691] CR0=0000000080050033 CR3=000000009f276000 CR4=00000000001426e0 [ 672.548912] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87201360 [ 672.555813] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 672.562066] *** Control State *** [ 672.566100] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 672.576258] EntryControls=0000d1ff ExitControls=002fefff [ 672.592892] EXT4-fs (loop3): Invalid log block size: 64 [ 672.596297] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 672.606234] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 672.619632] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 672.634784] reason=80000021 qualification=0000000000000000 [ 672.671621] IDTVectoring: info=00000000 errcode=00000000 [ 672.701099] TSC Offset = 0xfffffe94cd14a6d2 [ 672.708442] EPT pointer = 0x000000008e87401e 00:55:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCFLSH(r1, 0x540b, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:55:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800020100100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:29 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:29 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800060000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0xbb0ead02b7e62132, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:55:29 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) fcntl$getflags(r0, 0x200000000) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) lsetxattr(0x0, &(0x7f0000000100)=@known='system.posix_acl_default\x00', 0x0, 0x0, 0x3) write$apparmor_current(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) sched_setscheduler(0x0, 0x1, 0x0) 00:55:29 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800068000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 672.855719] EXT4-fs (loop0): Invalid log block size: 64 [ 672.889452] EXT4-fs (loop4): Invalid log block size: 64 00:55:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000200100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 672.944814] EXT4-fs (loop3): Invalid log block size: 64 00:55:29 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 673.031822] EXT4-fs (loop3): Invalid log block size: 64 [ 673.032076] EXT4-fs (loop1): Invalid log block size: 64 00:55:29 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:29 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80006c000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x200000010000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000ec0)={"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"}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r4, 0x84, 0x74, &(0x7f0000000240)=""/170, &(0x7f0000000300)=0xaa) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000040)={0x200, @time, 0x0, {0xfffffffffffffffe, 0x2}, 0x5, 0x1, 0x583}) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000340)) [ 673.180230] EXT4-fs (loop0): Invalid log block size: 64 00:55:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800010200100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 673.290178] EXT4-fs (loop4): Invalid log block size: 64 [ 673.296225] EXT4-fs (loop1): Invalid log block size: 64 [ 673.302556] EXT4-fs (loop3): Invalid log block size: 64 00:55:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200002}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r5, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x14}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe8e}]}]}, 0x40}}, 0x800) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:55:29 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000230100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:29 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800074000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:29 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 673.458064] EXT4-fs (loop3): Invalid log block size: 64 [ 673.519206] EXT4-fs (loop4): Invalid log block size: 64 00:55:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:29 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000002d0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 673.602301] EXT4-fs (loop1): Invalid log block size: 64 [ 673.621900] EXT4-fs (loop3): Invalid log block size: 64 00:55:29 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80007a000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 673.707917] EXT4-fs (loop3): Invalid log block size: 64 00:55:30 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x60000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 673.780203] EXT4-fs (loop4): Invalid log block size: 64 [ 673.780324] EXT4-fs (loop0): Invalid log block size: 64 00:55:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_dccp_buf(r3, 0x21, 0x2, &(0x7f0000000040)="01ef005b74d3fd", 0x7) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:55:30 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000003f0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:30 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000fc000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:30 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 673.932908] EXT4-fs (loop3): Invalid log block size: 64 00:55:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:30 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000030100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 674.064354] EXT4-fs (loop3): Invalid log block size: 64 [ 674.064571] EXT4-fs (loop0): Invalid log block size: 64 [ 674.085497] EXT4-fs (loop4): Invalid log block size: 64 00:55:30 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:30 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) pwritev(r0, &(0x7f0000000600)=[{&(0x7f0000000580)="b36b7a12a6f1e5b4088f24df1270b0f477c16fd66916580a5cbf09d87e948e9d3c6cb9548654f53770ee1d6736af7baed1d0a6ced51d6970ac9dbffd5037c02844220c769dc2919fbf97b89b0f0df2b2b0b3e51bb1e7dc65aaf55ef003bb0876232eb45b339cb5748987", 0x6a}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00'}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) unshare(0x40000000) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000380)={0x84, 0x5, 0x4, 0x0, {r1, r2/1000+10000}, {0x3, 0x8, 0x80, 0x1000, 0x5, 0x6, "0f0f8c2b"}, 0x95e6, 0x7, @planes=0x0, 0x4}) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) fchmod(r0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x3) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setregs(0xffffffffffffffff, r9, 0x8, &(0x7f00000001c0)="ee2922b629e8ed6057c3c934730b7e688199c9d11af3f3121e93bb158d53f25e3d48f21cabf091deeee6feab517bc24761ef7ebbc552f281b975e5a949aa65a9c1c2a0808dd2d1c7372affdc2b2f5fba5b8c49f51804774de838b424b5c50d485f8b8ad37f193c803b526931501fea67370e5a81c1f78e7bd49a0dd0017914286b9f714a68802fd198675fa6f529fff87430dd1e64c3955b04a9771c220a") socket$tipc(0x1e, 0x2, 0x0) 00:55:30 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff4, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:30 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000400100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 674.282660] EXT4-fs (loop3): Invalid log block size: 64 [ 674.317897] EXT4-fs (loop1): Invalid log block size: 64 [ 674.345931] sched: DL replenish lagged too much [ 674.386621] IPVS: ftp: loaded support on port[0] = 21 00:55:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 674.615468] *** Guest State *** [ 674.624687] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 674.655794] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 674.674064] CR3 = 0x0000000000000000 [ 674.678278] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 674.684514] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 674.697693] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 00:55:30 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6b6b6b00, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 674.704618] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 674.721856] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 674.731771] EXT4-fs (loop4): Invalid log block size: 64 [ 674.733787] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 674.746218] EXT4-fs (loop0): Invalid log block size: 64 00:55:31 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800010040100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 674.755079] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 674.763402] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 674.777602] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 674.793861] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 674.814513] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 674.825509] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 674.841489] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 674.851279] EFER = 0x0000000000000000 PAT = 0x0007040600070406 00:55:31 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000480100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:31 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 674.867754] EXT4-fs (loop3): Invalid log block size: 64 00:55:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 674.899929] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 674.903408] EXT4-fs (loop1): Invalid log block size: 64 [ 674.911705] Interruptibility = 00000000 ActivityState = 00000000 [ 674.929965] *** Host State *** [ 674.933402] RIP = 0xffffffff811b3210 RSP = 0xffff888090a478b8 00:55:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 674.946286] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 674.964489] FSBase=00007ff3fd506700 GSBase=ffff8880ae800000 TRBase=fffffe0000003000 00:55:31 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 674.995962] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 675.002133] CR0=0000000080050033 CR3=00000000882bf000 CR4=00000000001426f0 [ 675.018901] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87201360 [ 675.021310] EXT4-fs (loop4): Invalid log block size: 64 [ 675.031472] EXT4-fs (loop0): Invalid log block size: 64 00:55:31 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000050100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 675.053836] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 675.076521] *** Control State *** [ 675.080062] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 675.105192] EntryControls=0000d1ff ExitControls=002fefff [ 675.116908] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 675.124030] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 675.130845] VMExit: intr_info=00000000 errcode=00000000 ilen=00000002 [ 675.139062] reason=80000021 qualification=0000000000000000 [ 675.145762] IDTVectoring: info=00000000 errcode=00000000 [ 675.151458] TSC Offset = 0xfffffe9360448b08 [ 675.155865] EPT pointer = 0x000000008815001e [ 675.190719] IPVS: ftp: loaded support on port[0] = 21 [ 675.197086] *** Guest State *** [ 675.200374] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 675.209271] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 675.218142] CR3 = 0x0000000000000000 [ 675.218152] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 675.218163] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 675.218177] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 675.249659] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 675.259103] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 675.273255] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 675.285745] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 675.293757] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 675.293775] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 675.304459] EXT4-fs (loop3): Invalid log block size: 64 [ 675.327608] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 675.335600] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 675.343631] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 675.367658] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 675.375642] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 675.382204] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 675.394386] Interruptibility = 00000000 ActivityState = 00000000 [ 675.406961] *** Host State *** [ 675.410170] RIP = 0xffffffff811b3210 RSP = 0xffff888090a478b8 [ 675.417476] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 675.423888] FSBase=00007ff3fd506700 GSBase=ffff8880ae800000 TRBase=fffffe0000003000 [ 675.423901] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 675.423915] CR0=0000000080050033 CR3=00000000882bf000 CR4=00000000001426f0 [ 675.423929] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87201360 [ 675.454448] EXT4-fs (loop3): Invalid log block size: 64 [ 675.459943] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 675.467124] *** Control State *** [ 675.470587] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 675.477296] EntryControls=0000d1ff ExitControls=002fefff [ 675.482739] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 675.494253] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 675.514902] VMExit: intr_info=00000000 errcode=00000000 ilen=00000002 [ 675.526103] reason=80000021 qualification=0000000000000000 [ 675.532455] IDTVectoring: info=00000000 errcode=00000000 [ 675.537993] TSC Offset = 0xfffffe9360448b08 [ 675.542310] EPT pointer = 0x000000008815001e 00:55:31 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000004c0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 00:55:31 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:31 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000060100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:31 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x241, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f000000d000/0x4000)=nil, 0x4000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r5}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r6, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xbf9a}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x4000) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 675.629923] EXT4-fs (loop1): Invalid log block size: 64 [ 675.659062] EXT4-fs (loop4): Invalid log block size: 64 00:55:31 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000600100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:32 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000070100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:32 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 675.742873] kvm_hv_set_msr: 133 callbacks suppressed [ 675.742888] kvm [30654]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 675.776818] EXT4-fs (loop3): Invalid log block size: 64 00:55:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 675.827759] kvm [30654]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 675.849559] kvm [30654]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 675.870565] EXT4-fs (loop0): Invalid log block size: 64 [ 675.877426] EXT4-fs (loop3): Invalid log block size: 64 [ 675.884983] EXT4-fs (loop4): Invalid log block size: 64 [ 675.890831] kvm [30654]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 675.901674] kvm [30654]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 675.914222] kvm [30654]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 675.925009] kvm [30654]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 675.946263] kvm [30654]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 675.961936] kvm [30654]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 00:55:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000680100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 675.977680] kvm [30654]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 00:55:32 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:32 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 676.036221] EXT4-fs (loop1): Invalid log block size: 64 00:55:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000006c0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:32 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000090100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x80000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) bind$unix(r3, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) write$UHID_INPUT(r3, &(0x7f0000001c40)={0x8, "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", 0x1000}, 0x1006) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 676.181678] EXT4-fs (loop4): Invalid log block size: 64 [ 676.195606] EXT4-fs (loop3): Invalid log block size: 64 00:55:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 676.228441] EXT4-fs (loop0): Invalid log block size: 64 00:55:32 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 676.270240] EXT4-fs (loop1): Invalid log block size: 64 00:55:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000740100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:32 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000a0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 676.399546] EXT4-fs (loop3): Invalid log block size: 64 [ 676.414183] EXT4-fs (loop4): Invalid log block size: 64 00:55:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:32 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:32 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:32 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000b0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 676.511157] EXT4-fs (loop1): Invalid log block size: 64 [ 676.526227] EXT4-fs (loop0): Invalid log block size: 64 00:55:32 executing program 5: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400140, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10002, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x9241, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000200)={0x57, 0x309b, 0xfff, {0x8000, 0xe4ea}, {0x6a0, 0xd1dd}, @rumble={0xd157, 0x6}}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffff005c, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 00:55:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000007a0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 676.620818] EXT4-fs (loop4): Invalid log block size: 64 [ 676.630493] EXT4-fs (loop3): Invalid log block size: 64 00:55:33 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000f90100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:33 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 676.756936] EXT4-fs (loop3): Invalid log block size: 64 [ 676.765912] EXT4-fs (loop1): Invalid log block size: 64 00:55:33 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="130dcb0f00008001"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) getpid() 00:55:33 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800004100100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:33 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:33 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 676.934830] audit: type=1804 audit(1549500933.154:82): pid=30758 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir336714134/syzkaller.VbM451/816/memory.events" dev="sda1" ino=16881 res=1 00:55:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000280), 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x2000000000000000]}, 0x2c) r3 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) [ 677.004017] audit: type=1804 audit(1549500933.194:83): pid=30758 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir336714134/syzkaller.VbM451/816/memory.events" dev="sda1" ino=16881 res=1 [ 677.058367] EXT4-fs (loop4): Invalid log block size: 64 [ 677.071289] EXT4-fs (loop3): Invalid log block size: 64 [ 677.085926] EXT4-fs (loop0): Invalid log block size: 64 00:55:33 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 677.131094] EXT4-fs (loop1): Invalid log block size: 64 00:55:33 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:55:33 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:33 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800020100100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:33 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000fc0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 677.257966] EXT4-fs (loop3): Invalid log block size: 64 00:55:33 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xc2030000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 677.329473] EXT4-fs (loop4): Invalid log block size: 64 [ 677.362078] EXT4-fs (loop1): Invalid log block size: 64 00:55:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:33 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 677.386144] XFS (loop5): Invalid superblock magic number 00:55:33 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000200100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 677.457608] EXT4-fs (loop0): Invalid log block size: 64 00:55:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:33 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000fff0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 677.627180] EXT4-fs (loop4): Invalid log block size: 64 [ 677.639306] EXT4-fs (loop3): Invalid log block size: 64 00:55:33 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 677.715476] XFS (loop5): Invalid superblock magic number [ 677.731842] EXT4-fs (loop1): Invalid log block size: 64 00:55:34 executing program 5: 00:55:34 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 677.789856] EXT4-fs (loop0): Invalid log block size: 64 00:55:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:34 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800010200100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 677.944244] EXT4-fs (loop4): Invalid log block size: 64 00:55:34 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000006d000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:34 executing program 5: 00:55:34 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6b6b6b00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 678.027672] EXT4-fs (loop3): Invalid log block size: 64 00:55:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:34 executing program 5: [ 678.095769] EXT4-fs (loop1): Invalid log block size: 64 [ 678.106855] EXT4-fs (loop3): Invalid log block size: 64 00:55:34 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:34 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000230100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 678.193111] EXT4-fs (loop0): Invalid log block size: 64 [ 678.204669] EXT4-fs (loop4): Invalid log block size: 64 00:55:34 executing program 5: 00:55:34 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfc000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:34 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000000ec000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:34 executing program 5: [ 678.311967] EXT4-fs (loop3): Invalid log block size: 64 00:55:34 executing program 5: [ 678.376914] EXT4-fs (loop3): Invalid log block size: 64 [ 678.385991] EXT4-fs (loop1): Invalid log block size: 64 00:55:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x0, 0x0, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:34 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 678.490211] EXT4-fs (loop4): Invalid log block size: 64 [ 678.509504] EXT4-fs (loop0): Invalid log block size: 64 00:55:34 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000006d0000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:34 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000002d0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendto$isdn(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 00:55:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x0, 0x0, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:34 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:34 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000ec0000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 678.630364] EXT4-fs (loop3): Invalid log block size: 64 [ 678.642034] EXT4-fs (loop0): Invalid log block size: 64 00:55:34 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000003f0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x0, 0x0, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 678.766397] EXT4-fs (loop3): Invalid log block size: 64 [ 678.784721] EXT4-fs (loop1): Invalid log block size: 64 [ 678.791959] EXT4-fs (loop4): Invalid log block size: 64 00:55:35 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="010900edffffffffffff05000000040011e8"], 0x1}}, 0x0) 00:55:35 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:35 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000400100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 678.934342] EXT4-fs (loop0): Invalid log block size: 64 00:55:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x200000001) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) 00:55:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:35 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:35 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000020100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 679.040503] EXT4-fs (loop3): Invalid log block size: 64 [ 679.049756] EXT4-fs (loop1): Invalid log block size: 64 00:55:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:35 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000480100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 679.165306] EXT4-fs (loop4): Invalid log block size: 64 [ 679.174032] EXT4-fs (loop0): Invalid log block size: 64 [ 679.185507] sctp: [Deprecated]: syz-executor5 (pid 30976) Use of int in max_burst socket option. [ 679.185507] Use struct sctp_assoc_value instead 00:55:35 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:35 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:35 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000030100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 679.268031] sctp: [Deprecated]: syz-executor5 (pid 30968) Use of int in max_burst socket option. [ 679.268031] Use struct sctp_assoc_value instead 00:55:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 679.361046] EXT4-fs (loop3): Invalid log block size: 64 [ 679.369822] EXT4-fs (loop0): Invalid log block size: 64 [ 679.378086] EXT4-fs (loop1): Invalid log block size: 64 00:55:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:35 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x4, 0x8012, r0, 0x4b000) [ 679.423783] EXT4-fs (loop4): Invalid log block size: 64 00:55:35 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000040100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:35 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000004c0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:35 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 679.491073] EXT4-fs (loop3): Invalid log block size: 64 00:55:35 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 679.587089] audit: type=1400 audit(1549500935.814:84): avc: denied { map } for pid=31004 comm="syz-executor5" path="/dev/usbmon0" dev="devtmpfs" ino=15855 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1 00:55:35 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x4, 0x8012, r0, 0x4b000) [ 679.680089] EXT4-fs (loop4): Invalid log block size: 64 [ 679.685655] EXT4-fs (loop0): Invalid log block size: 64 [ 679.692003] EXT4-fs (loop1): Invalid log block size: 64 00:55:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:36 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60b409000027000099244d9c5851370ee1cc3645bd03000000000000000000ffffe0000002ff020000000000003f0000000093d8d62a500cee000001880090780009040060b680fa0000000000000000000000000000ffffffffffff000000"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x166) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000000)=0x100000, 0xc92e) 00:55:36 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000050100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 679.888572] EXT4-fs (loop3): Invalid log block size: 64 00:55:36 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000600100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 679.941257] EXT4-fs (loop3): Invalid log block size: 64 [ 679.942783] EXT4-fs (loop4): Invalid log block size: 64 00:55:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:36 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:36 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:36 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000060100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:36 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000680100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 680.142565] EXT4-fs (loop3): Invalid log block size: 64 00:55:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 680.198374] EXT4-fs (loop4): Invalid log block size: 64 [ 680.216436] EXT4-fs (loop3): Invalid log block size: 64 00:55:36 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000070100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:36 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000006c0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:36 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:36 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 680.364628] EXT4-fs (loop0): Invalid log block size: 64 00:55:36 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000740100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 680.443712] EXT4-fs (loop4): Invalid log block size: 64 [ 680.455175] EXT4-fs (loop3): Invalid log block size: 64 00:55:36 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000080100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:36 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 680.641991] EXT4-fs (loop1): Invalid log block size: 64 [ 680.656997] EXT4-fs (loop3): Invalid log block size: 64 [ 680.674259] EXT4-fs (loop4): Invalid log block size: 64 [ 680.676774] EXT4-fs (loop0): Invalid log block size: 64 00:55:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:37 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff4, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:37 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000007a0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:37 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:37 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000090100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 680.996060] EXT4-fs (loop1): Invalid log block size: 64 00:55:37 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000fc0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 681.037276] EXT4-fs (loop3): Invalid log block size: 64 [ 681.038087] EXT4-fs (loop4): Invalid log block size: 64 00:55:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:37 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000a0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 681.121907] EXT4-fs (loop3): Invalid log block size: 64 00:55:37 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:37 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000fff0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:37 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 00:55:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:37 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000b0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 681.318443] EXT4-fs (loop1): Invalid log block size: 64 [ 681.350601] EXT4-fs (loop3): Invalid log block size: 64 00:55:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 00:55:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 681.398324] EXT4-fs (loop4): Invalid log block size: 64 [ 681.448996] EXT4-fs (loop0): Invalid log block size: 64 00:55:37 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000001000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:37 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 00:55:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 681.526061] EXT4-fs (loop3): Invalid log block size: 64 00:55:37 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000230100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:37 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 681.633898] EXT4-fs (loop4): Invalid log block size: 64 00:55:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 681.678110] EXT4-fs (loop1): Invalid log block size: 64 00:55:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:37 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000002d0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:38 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1004000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 681.790391] EXT4-fs (loop3): Invalid log block size: 64 00:55:38 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000004000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x7, 0x0, &(0x7f00000000c0)="3b1163cd78b89e", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:38 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000480100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 681.876557] EXT4-fs (loop3): Invalid log block size: 64 00:55:38 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 681.938644] EXT4-fs (loop4): Invalid log block size: 64 00:55:38 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1a0f000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:38 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000004c0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 682.009293] EXT4-fs (loop1): Invalid log block size: 64 [ 682.041452] EXT4-fs (loop3): Invalid log block size: 64 00:55:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x7, 0x0, &(0x7f00000000c0)="3b1163cd78b89e", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:38 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000006d000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:38 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000600100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 682.188923] EXT4-fs (loop4): Invalid log block size: 64 [ 682.207112] EXT4-fs (loop3): Invalid log block size: 64 00:55:38 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000680100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:38 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000000fb000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x7, 0x0, &(0x7f00000000c0)="3b1163cd78b89e", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:38 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:38 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1f00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 682.371584] EXT4-fs (loop1): Invalid log block size: 64 [ 682.406178] EXT4-fs (loop3): Invalid log block size: 64 00:55:38 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000040000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xb, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 682.808299] EXT4-fs (loop3): Invalid log block size: 64 [ 682.826181] EXT4-fs (loop4): Invalid log block size: 64 00:55:39 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:39 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:39 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 682.996165] EXT4-fs (loop3): Invalid log block size: 64 [ 683.004452] EXT4-fs (loop4): Invalid log block size: 64 [ 683.616601] device bridge_slave_1 left promiscuous mode [ 683.622119] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.696577] device bridge_slave_0 left promiscuous mode [ 683.702063] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.938288] device hsr_slave_1 left promiscuous mode [ 683.990739] device hsr_slave_0 left promiscuous mode [ 684.061399] team0 (unregistering): Port device team_slave_1 removed [ 684.080461] team0 (unregistering): Port device team_slave_0 removed [ 684.100572] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 684.181090] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 684.331009] bond0 (unregistering): Released all slaves [ 685.122403] IPVS: ftp: loaded support on port[0] = 21 [ 685.313677] chnl_net:caif_netlink_parms(): no params data found [ 685.370437] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.377454] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.384796] device bridge_slave_0 entered promiscuous mode [ 685.392369] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.399854] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.407358] device bridge_slave_1 entered promiscuous mode [ 685.430704] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 685.441544] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 685.473917] team0: Port device team_slave_0 added [ 685.481182] team0: Port device team_slave_1 added [ 685.553596] device hsr_slave_0 entered promiscuous mode [ 685.610363] device hsr_slave_1 entered promiscuous mode [ 685.741526] 8021q: adding VLAN 0 to HW filter on device bond0 [ 685.773211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 685.796219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 685.805792] 8021q: adding VLAN 0 to HW filter on device team0 [ 685.816916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 685.824655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 685.846226] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.852570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.875995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 685.883904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 685.906014] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.912459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 685.936254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 685.971694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 685.991788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 686.024394] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 686.055899] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 686.077373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 686.085267] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 686.106334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 686.114236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 686.135912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 686.143553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 686.161973] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 686.168886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 686.176838] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 00:55:42 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000006c0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xb, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:42 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000006d0000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:42 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:42 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:42 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xb, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:42 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 686.337104] EXT4-fs (loop1): Invalid log block size: 64 [ 686.343430] EXT4-fs (loop3): Invalid log block size: 64 [ 686.344615] EXT4-fs (loop4): Invalid log block size: 64 00:55:42 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000fb0000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:42 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000740100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xd, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682b", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:42 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 686.537512] EXT4-fs (loop3): Invalid log block size: 64 00:55:42 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 686.616837] EXT4-fs (loop0): Invalid log block size: 64 00:55:42 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000007a0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 686.678226] EXT4-fs (loop1): Invalid log block size: 64 [ 686.695113] EXT4-fs (loop4): Invalid log block size: 64 00:55:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xd, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682b", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:43 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000020100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 686.738463] EXT4-fs (loop3): Invalid log block size: 64 00:55:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000f90100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2d00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 686.850620] EXT4-fs (loop3): Invalid log block size: 64 00:55:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xd, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682b", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000300000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 686.937519] EXT4-fs (loop1): Invalid log block size: 64 00:55:43 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000030100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 686.998046] EXT4-fs (loop4): Invalid log block size: 64 00:55:43 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 687.124440] EXT4-fs (loop0): Invalid log block size: 64 [ 687.186879] EXT4-fs (loop3): Invalid log block size: 64 [ 687.192559] EXT4-fs (loop1): Invalid log block size: 64 00:55:43 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000040100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 687.315400] EXT4-fs (loop3): Invalid log block size: 64 [ 687.316466] EXT4-fs (loop4): Invalid log block size: 64 00:55:43 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6b6b6b00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000050100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x0, 0x0, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 687.464697] EXT4-fs (loop0): Invalid log block size: 64 00:55:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000700000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000060100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 687.539563] EXT4-fs (loop3): Invalid log block size: 64 [ 687.563652] EXT4-fs (loop4): Invalid log block size: 64 00:55:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x0, 0x0, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x0, 0x0, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:43 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfc000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 687.669560] EXT4-fs (loop0): Invalid log block size: 64 00:55:44 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000260800000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 687.757809] EXT4-fs (loop1): Invalid log block size: 64 00:55:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 687.857469] EXT4-fs (loop4): Invalid log block size: 64 [ 687.862993] EXT4-fs (loop3): Invalid log block size: 64 00:55:44 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000070100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:44 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:44 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 688.011478] EXT4-fs (loop1): Invalid log block size: 64 [ 688.016538] EXT4-fs (loop0): Invalid log block size: 64 00:55:44 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000a00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:44 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000080100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 688.175339] EXT4-fs (loop3): Invalid log block size: 64 [ 688.198039] EXT4-fs (loop0): Invalid log block size: 64 [ 688.208049] EXT4-fs (loop4): Invalid log block size: 64 00:55:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:44 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:44 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6000000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:44 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000f00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 688.347084] EXT4-fs (loop1): Invalid log block size: 64 00:55:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:44 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000090100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 688.448138] EXT4-fs (loop3): Invalid log block size: 64 00:55:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 688.505140] EXT4-fs (loop4): Invalid log block size: 64 [ 688.524595] EXT4-fs (loop0): Invalid log block size: 64 [ 688.524714] EXT4-fs (loop3): Invalid log block size: 64 00:55:44 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000001400000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:44 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 688.714114] EXT4-fs (loop1): Invalid log block size: 64 00:55:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:45 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:45 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000a0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 688.826154] EXT4-fs (loop0): Invalid log block size: 64 00:55:45 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000042a00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 688.891891] EXT4-fs (loop3): Invalid log block size: 64 [ 688.922362] EXT4-fs (loop4): Invalid log block size: 64 00:55:45 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 689.060907] EXT4-fs (loop1): Invalid log block size: 64 [ 689.067526] EXT4-fs (loop3): Invalid log block size: 64 00:55:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:45 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 689.156236] EXT4-fs (loop0): Invalid log block size: 64 00:55:45 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000b0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:45 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000262a00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 689.312973] EXT4-fs (loop4): Invalid log block size: 64 00:55:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 00:55:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:55:45 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:45 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000230100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 689.424880] EXT4-fs (loop3): Invalid log block size: 64 [ 689.441028] EXT4-fs (loop0): Invalid log block size: 64 [ 689.451385] EXT4-fs (loop1): Invalid log block size: 64 00:55:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 00:55:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:45 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000003f00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 689.620003] EXT4-fs (loop3): Invalid log block size: 64 [ 689.651874] EXT4-fs (loop4): Invalid log block size: 64 [ 689.657384] EXT4-fs (loop1): Invalid log block size: 64 00:55:45 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, 0x0) 00:55:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:45 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, 0x0) 00:55:46 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:46 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000002d0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 689.908126] EXT4-fs (loop3): Invalid log block size: 64 [ 689.937575] EXT4-fs (loop0): Invalid log block size: 64 00:55:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:46 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 689.984866] EXT4-fs (loop3): Invalid log block size: 64 00:55:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, 0x0) 00:55:46 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 690.074057] EXT4-fs (loop4): Invalid log block size: 64 [ 690.084671] EXT4-fs (loop1): Invalid log block size: 64 00:55:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:46 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000480100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:46 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:46 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044200000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 690.307259] EXT4-fs (loop0): Invalid log block size: 64 [ 690.309832] EXT4-fs (loop3): Invalid log block size: 64 00:55:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:46 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800010040100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 690.424234] EXT4-fs (loop1): Invalid log block size: 64 00:55:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x7, 0x0, &(0x7f00000000c0)="3b1163cd78b89e", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:46 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000004c0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:46 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044300000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 690.522284] EXT4-fs (loop4): Invalid log block size: 64 [ 690.522290] EXT4-fs (loop3): Invalid log block size: 64 [ 690.537844] EXT4-fs (loop2): Invalid log block size: 64 00:55:46 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:46 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x7, 0x0, &(0x7f00000000c0)="3b1163cd78b89e", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:46 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000600100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:47 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044400000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 690.729532] EXT4-fs (loop0): Invalid log block size: 64 00:55:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x7, 0x0, &(0x7f00000000c0)="3b1163cd78b89e", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 690.799632] EXT4-fs (loop3): Invalid log block size: 64 [ 690.828519] EXT4-fs (loop4): Invalid log block size: 64 00:55:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r4) r5 = socket(0x200000000000011, 0x803, 0x0) r6 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r4, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) [ 690.887384] EXT4-fs (loop1): Invalid log block size: 64 00:55:47 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:47 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xb, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 690.976078] EXT4-fs (loop0): Invalid log block size: 64 00:55:47 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000680100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:47 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 691.093751] EXT4-fs (loop4): Invalid log block size: 64 [ 691.122093] EXT4-fs (loop3): Invalid log block size: 64 00:55:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xb, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:47 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf4ffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 691.161190] kvm_hv_set_msr: 16 callbacks suppressed [ 691.161204] kvm [31965]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 691.198018] kvm [31965]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 00:55:47 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044600000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 691.216901] kvm [31965]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 691.226768] kvm [31965]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 691.236229] kvm [31965]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 691.245327] kvm [31965]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 691.254437] kvm [31965]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 691.263901] kvm [31965]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 691.273059] kvm [31965]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 691.282274] kvm [31965]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 [ 691.314117] EXT4-fs (loop1): Invalid log block size: 64 [ 691.323362] EXT4-fs (loop3): Invalid log block size: 64 00:55:47 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000006c0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:47 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:47 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044700000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 691.416930] EXT4-fs (loop4): Invalid log block size: 64 00:55:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r4) r5 = socket(0x200000000000011, 0x803, 0x0) r6 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r4, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) 00:55:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xb, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:47 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 691.539863] EXT4-fs (loop1): Invalid log block size: 64 00:55:47 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000740100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xd, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682b", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 691.622050] EXT4-fs (loop0): Invalid log block size: 64 [ 691.625998] EXT4-fs (loop3): Invalid log block size: 64 00:55:47 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044800000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 691.747735] EXT4-fs (loop4): Invalid log block size: 64 [ 691.763072] EXT4-fs (loop3): Invalid log block size: 64 00:55:48 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000007a0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xd, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682b", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:48 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r4) r5 = socket(0x200000000000011, 0x803, 0x0) r6 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r4, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) 00:55:48 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 691.892754] EXT4-fs (loop0): Invalid log block size: 64 00:55:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xd, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682b", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 691.933644] EXT4-fs (loop1): Invalid log block size: 64 00:55:48 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044900000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:48 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000300000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 692.084774] EXT4-fs (loop4): Invalid log block size: 64 [ 692.101418] EXT4-fs (loop0): Invalid log block size: 64 00:55:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r4) r5 = socket(0x200000000000011, 0x803, 0x0) r6 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r4, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) 00:55:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:48 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:48 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044a00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 692.234587] EXT4-fs (loop1): Invalid log block size: 64 [ 692.240308] EXT4-fs (loop3): Invalid log block size: 64 00:55:48 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r4) r5 = socket(0x200000000000011, 0x803, 0x0) r6 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r4, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) [ 692.371551] EXT4-fs (loop3): Invalid log block size: 64 [ 692.381300] EXT4-fs (loop4): Invalid log block size: 64 [ 692.391536] EXT4-fs (loop0): Invalid log block size: 64 00:55:48 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:48 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:48 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044b00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 692.511442] EXT4-fs (loop1): Invalid log block size: 64 00:55:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 692.569055] EXT4-fs (loop4): Invalid log block size: 64 00:55:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r4) r5 = socket(0x200000000000011, 0x803, 0x0) r6 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r4, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 00:55:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:48 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 692.704547] EXT4-fs (loop3): Invalid log block size: 64 [ 692.723120] EXT4-fs (loop0): Invalid log block size: 64 00:55:49 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000700000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r4) r5 = socket(0x200000000000011, 0x803, 0x0) r6 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r4, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) 00:55:49 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1004000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 692.866540] EXT4-fs (loop4): Invalid log block size: 64 00:55:49 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044c00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:49 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 692.959079] EXT4-fs (loop1): Invalid log block size: 64 00:55:49 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000a00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:49 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000003b300000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 693.034072] EXT4-fs (loop3): Invalid log block size: 64 00:55:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:49 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000f00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 693.087867] EXT4-fs (loop4): Invalid log block size: 64 00:55:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r4) r5 = socket(0x200000000000011, 0x803, 0x0) r6 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r4, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:55:49 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 693.180126] EXT4-fs (loop3): Invalid log block size: 64 [ 693.196548] EXT4-fs (loop0): Invalid log block size: 64 00:55:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:49 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:49 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000200000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 693.315180] EXT4-fs (loop1): Invalid log block size: 64 00:55:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:49 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000001400000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 693.436811] EXT4-fs (loop4): Invalid log block size: 64 [ 693.480558] EXT4-fs (loop3): Invalid log block size: 64 00:55:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 693.510102] EXT4-fs (loop0): Invalid log block size: 64 00:55:49 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:49 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000300000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:49 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 693.615411] EXT4-fs (loop1): Invalid log block size: 64 00:55:49 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000002500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 693.690945] EXT4-fs (loop4): Invalid log block size: 64 [ 693.725859] EXT4-fs (loop0): Invalid log block size: 64 00:55:50 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:50 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000400000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 693.849269] EXT4-fs (loop3): Invalid log block size: 64 00:55:50 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000262500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:50 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 693.940831] EXT4-fs (loop4): Invalid log block size: 64 [ 693.952808] EXT4-fs (loop3): Invalid log block size: 64 00:55:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:50 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:50 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:50 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000042800000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 694.058324] EXT4-fs (loop0): Invalid log block size: 64 00:55:50 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000700000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:50 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000262900000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 694.178434] EXT4-fs (loop3): Invalid log block size: 64 00:55:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'nr0\x00'}) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 694.271136] EXT4-fs (loop4): Invalid log block size: 64 [ 694.276735] EXT4-fs (loop3): Invalid log block size: 64 00:55:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 00:55:50 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2d00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:50 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'nr0\x00'}) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 694.396132] EXT4-fs (loop1): Invalid log block size: 64 [ 694.396893] EXT4-fs (loop0): Invalid log block size: 64 00:55:50 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000003b00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, 0x0) 00:55:50 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000a00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 694.500607] EXT4-fs (loop3): Invalid log block size: 64 00:55:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, 0x0) 00:55:50 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000003f00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 694.586745] EXT4-fs (loop3): Invalid log block size: 64 [ 694.592550] EXT4-fs (loop4): Invalid log block size: 64 00:55:50 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:50 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'nr0\x00'}) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 694.725831] EXT4-fs (loop0): Invalid log block size: 64 00:55:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, 0x0) [ 694.785037] EXT4-fs (loop4): Invalid log block size: 64 00:55:51 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000f00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:51 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 694.867336] EXT4-fs (loop1): Invalid log block size: 64 [ 694.888764] EXT4-fs (loop3): Invalid log block size: 64 00:55:51 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:51 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 695.034326] EXT4-fs (loop0): Invalid log block size: 64 [ 695.047070] EXT4-fs (loop3): Invalid log block size: 64 00:55:51 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:51 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000001000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 695.114242] EXT4-fs (loop4): Invalid log block size: 64 00:55:51 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:51 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 695.258357] EXT4-fs (loop5): Invalid log block size: 64 [ 695.262382] EXT4-fs (loop1): Invalid log block size: 64 00:55:51 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:51 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000001400000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 695.356493] EXT4-fs (loop4): Invalid log block size: 64 00:55:51 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 695.396803] EXT4-fs (loop3): Invalid log block size: 64 00:55:51 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 695.497426] EXT4-fs (loop1): Invalid log block size: 64 [ 695.509567] EXT4-fs (loop0): Invalid log block size: 64 00:55:51 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 695.567126] EXT4-fs (loop5): Invalid log block size: 64 00:55:51 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:51 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000b303000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:51 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 695.670610] EXT4-fs (loop4): Invalid log block size: 101711936 [ 695.701386] EXT4-fs (loop3): Invalid log block size: 64 00:55:51 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:51 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000002a04000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 695.802261] EXT4-fs (loop1): Invalid log block size: 64 [ 695.826620] EXT4-fs (loop5): Invalid log block size: 64 [ 695.833588] EXT4-fs (loop3): Invalid log block size: 64 00:55:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:52 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:52 executing program 5 (fault-call:4 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 695.997206] EXT4-fs (loop0): Invalid log block size: 64 00:55:52 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044200000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 696.043393] EXT4-fs (loop4): Invalid log block size: 101711936 00:55:52 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004104000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 696.147216] EXT4-fs (loop3): Invalid log block size: 64 [ 696.158464] FAULT_INJECTION: forcing a failure. [ 696.158464] name failslab, interval 1, probability 0, space 0, times 0 [ 696.181534] CPU: 1 PID: 32398 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 696.188856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.198210] Call Trace: [ 696.200810] dump_stack+0x172/0x1f0 [ 696.204451] should_fail.cold+0xa/0x1b [ 696.208348] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 696.213453] ? lock_downgrade+0x810/0x810 [ 696.217608] ? ___might_sleep+0x163/0x280 [ 696.221764] __should_failslab+0x121/0x190 [ 696.226000] should_failslab+0x9/0x14 [ 696.229808] kmem_cache_alloc_trace+0x2d1/0x760 [ 696.234490] ? kasan_check_read+0x11/0x20 [ 696.238757] fib6_info_alloc+0x84/0x1c0 [ 696.242738] ip6_route_info_create+0x66f/0x2970 [ 696.247406] ? mutex_trylock+0x1e0/0x1e0 [ 696.251471] ? find_held_lock+0x35/0x130 [ 696.255550] ? ip6_nh_lookup_table.isra.0+0x2c0/0x2c0 [ 696.260740] ? lock_downgrade+0x810/0x810 [ 696.264901] ip6_route_add+0x27/0xd0 [ 696.268618] ipv6_route_ioctl+0x29e/0x350 [ 696.272782] ? rt6_purge_dflt_routers+0x8c0/0x8c0 [ 696.277636] ? avc_has_extended_perms+0x8e7/0x10f0 [ 696.282604] ? kasan_check_read+0x11/0x20 [ 696.286810] inet6_ioctl+0x11a/0x1c0 [ 696.290544] sock_do_ioctl+0xe2/0x320 [ 696.294349] ? do_recvmmsg+0x7a0/0x7a0 [ 696.298242] ? kasan_check_read+0x11/0x20 [ 696.302404] ? mark_held_locks+0x100/0x100 [ 696.306650] sock_ioctl+0x331/0x620 [ 696.310277] ? routing_ioctl+0x580/0x580 [ 696.314339] ? __fget+0x340/0x540 [ 696.317798] ? ___might_sleep+0x163/0x280 [ 696.321947] ? __might_sleep+0x95/0x190 [ 696.325928] ? routing_ioctl+0x580/0x580 [ 696.329989] do_vfs_ioctl+0xd6e/0x1390 [ 696.333879] ? selinux_file_ioctl+0x46f/0x5e0 [ 696.338370] ? selinux_file_ioctl+0x125/0x5e0 [ 696.342860] ? ioctl_preallocate+0x210/0x210 [ 696.347288] ? selinux_file_mprotect+0x620/0x620 [ 696.352055] ? iterate_fd+0x360/0x360 [ 696.355859] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 696.361393] ? fput+0x128/0x1a0 [ 696.364678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.370215] ? security_file_ioctl+0x93/0xc0 [ 696.374627] ksys_ioctl+0xab/0xd0 [ 696.378090] __x64_sys_ioctl+0x73/0xb0 [ 696.381979] do_syscall_64+0x103/0x610 [ 696.385872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.391063] RIP: 0033:0x457e39 [ 696.394254] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.413163] RSP: 002b:00007ff3fd526c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 696.420872] RAX: ffffffffffffffda RBX: 00007ff3fd526c90 RCX: 0000000000457e39 [ 696.428140] RDX: 0000000020000000 RSI: 000000000000890b RDI: 0000000000000004 [ 696.435412] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 00:55:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:52 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004204000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:52 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 696.442679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3fd5276d4 [ 696.450378] R13: 00000000004c3694 R14: 00000000004d6380 R15: 0000000000000005 00:55:52 executing program 5 (fault-call:4 fault-nth:1): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 696.514604] EXT4-fs (loop3): Invalid log block size: 64 [ 696.520679] EXT4-fs (loop1): Invalid log block size: 64 00:55:52 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004304000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 696.644039] FAULT_INJECTION: forcing a failure. [ 696.644039] name failslab, interval 1, probability 0, space 0, times 0 [ 696.655800] CPU: 1 PID: 32416 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 696.662909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.672261] Call Trace: [ 696.674859] dump_stack+0x172/0x1f0 [ 696.678494] should_fail.cold+0xa/0x1b [ 696.682392] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 696.687510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.693050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.698605] __should_failslab+0x121/0x190 [ 696.702843] should_failslab+0x9/0x14 [ 696.706647] kmem_cache_alloc_trace+0x4b/0x760 [ 696.711226] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.716760] ? ___neigh_lookup_noref.constprop.0+0x53b/0x780 [ 696.722563] find_match+0x8e1/0xe20 [ 696.726200] fib6_table_lookup+0x48e/0xce0 [ 696.730450] ? rt6_age_exceptions+0x650/0x650 [ 696.734945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.740486] ? check_preemption_disabled+0x48/0x290 [ 696.745514] ? lock_acquire+0xf0/0x3f0 [ 696.749425] ? kasan_check_read+0x11/0x20 [ 696.753574] ip6_pol_route+0x1a4/0xf00 [ 696.757460] ? ip6_pol_route_lookup+0xc10/0xc10 [ 696.762129] ? lock_downgrade+0x810/0x810 [ 696.766276] ? kasan_check_read+0x11/0x20 [ 696.770432] ip6_nh_lookup_table.isra.0+0x1be/0x2c0 [ 696.775451] ? ip6_pol_route_output+0x70/0x70 [ 696.779956] ? kasan_check_read+0x11/0x20 [ 696.784107] ip6_route_info_create+0x1aed/0x2970 [ 696.788994] ? ip6_nh_lookup_table.isra.0+0x2c0/0x2c0 [ 696.794183] ? lock_downgrade+0x810/0x810 [ 696.798335] ip6_route_add+0x27/0xd0 [ 696.802047] ipv6_route_ioctl+0x29e/0x350 [ 696.806196] ? rt6_purge_dflt_routers+0x8c0/0x8c0 [ 696.811044] ? avc_has_extended_perms+0x8e7/0x10f0 [ 696.815988] ? kasan_check_read+0x11/0x20 [ 696.820145] inet6_ioctl+0x11a/0x1c0 [ 696.823862] sock_do_ioctl+0xe2/0x320 [ 696.827665] ? do_recvmmsg+0x7a0/0x7a0 [ 696.831575] ? kasan_check_read+0x11/0x20 [ 696.835725] ? mark_held_locks+0x100/0x100 [ 696.839959] sock_ioctl+0x331/0x620 [ 696.843587] ? routing_ioctl+0x580/0x580 [ 696.847662] ? __fget+0x340/0x540 [ 696.851119] ? ___might_sleep+0x163/0x280 [ 696.855276] ? __might_sleep+0x95/0x190 [ 696.859256] ? routing_ioctl+0x580/0x580 [ 696.863323] do_vfs_ioctl+0xd6e/0x1390 [ 696.867209] ? selinux_file_ioctl+0x46f/0x5e0 [ 696.871721] ? selinux_file_ioctl+0x125/0x5e0 [ 696.876218] ? ioctl_preallocate+0x210/0x210 [ 696.880629] ? selinux_file_mprotect+0x620/0x620 [ 696.885398] ? iterate_fd+0x360/0x360 [ 696.889195] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 696.894747] ? fput+0x128/0x1a0 [ 696.898039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.903576] ? security_file_ioctl+0x93/0xc0 [ 696.907985] ksys_ioctl+0xab/0xd0 [ 696.911445] __x64_sys_ioctl+0x73/0xb0 [ 696.915334] do_syscall_64+0x103/0x610 [ 696.919229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.924761] RIP: 0033:0x457e39 00:55:52 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6000000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:53 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044300000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 696.927955] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.946853] RSP: 002b:00007ff3fd526c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 696.954564] RAX: ffffffffffffffda RBX: 00007ff3fd526c90 RCX: 0000000000457e39 [ 696.962790] RDX: 0000000020000000 RSI: 000000000000890b RDI: 0000000000000004 [ 696.970058] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 696.977322] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3fd5276d4 [ 696.984587] R13: 00000000004c3694 R14: 00000000004d6380 R15: 0000000000000005 00:55:53 executing program 5 (fault-call:4 fault-nth:2): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 697.021334] EXT4-fs (loop4): Invalid log block size: 101711936 [ 697.045534] EXT4-fs (loop0): Invalid log block size: 64 [ 697.088651] FAULT_INJECTION: forcing a failure. [ 697.088651] name failslab, interval 1, probability 0, space 0, times 0 [ 697.100026] CPU: 0 PID: 32429 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 697.107119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.107218] Call Trace: [ 697.107245] dump_stack+0x172/0x1f0 [ 697.122793] should_fail.cold+0xa/0x1b [ 697.126684] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 697.131790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.137436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.142984] __should_failslab+0x121/0x190 [ 697.147220] should_failslab+0x9/0x14 [ 697.151031] kmem_cache_alloc_trace+0x4b/0x760 [ 697.151045] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.151061] ? ___neigh_lookup_noref.constprop.0+0x53b/0x780 [ 697.151079] find_match+0x8e1/0xe20 [ 697.166962] fib6_table_lookup+0x48e/0xce0 [ 697.166992] ? rt6_age_exceptions+0x650/0x650 [ 697.167006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.167023] ? check_preemption_disabled+0x48/0x290 [ 697.167035] ? lock_acquire+0xf0/0x3f0 [ 697.167053] ? kasan_check_read+0x11/0x20 [ 697.174887] ip6_pol_route+0x1a4/0xf00 [ 697.174904] ? ip6_pol_route_lookup+0xc10/0xc10 [ 697.174918] ? lock_downgrade+0x810/0x810 [ 697.174951] ? kasan_check_read+0x11/0x20 [ 697.174974] ip6_nh_lookup_table.isra.0+0x1be/0x2c0 [ 697.219801] ? ip6_pol_route_output+0x70/0x70 [ 697.224311] ? kasan_check_read+0x11/0x20 [ 697.228479] ip6_route_info_create+0x1aed/0x2970 [ 697.233247] ? ip6_nh_lookup_table.isra.0+0x2c0/0x2c0 [ 697.238438] ? lock_downgrade+0x810/0x810 [ 697.242608] ip6_route_add+0x27/0xd0 [ 697.246327] ipv6_route_ioctl+0x29e/0x350 [ 697.250490] ? rt6_purge_dflt_routers+0x8c0/0x8c0 [ 697.255352] ? avc_has_extended_perms+0x8e7/0x10f0 [ 697.260323] ? kasan_check_read+0x11/0x20 [ 697.264496] inet6_ioctl+0x11a/0x1c0 [ 697.268230] sock_do_ioctl+0xe2/0x320 [ 697.272042] ? do_recvmmsg+0x7a0/0x7a0 [ 697.275928] ? kasan_check_read+0x11/0x20 [ 697.280092] ? mark_held_locks+0x100/0x100 [ 697.284331] sock_ioctl+0x331/0x620 [ 697.287963] ? routing_ioctl+0x580/0x580 [ 697.292022] ? __fget+0x340/0x540 [ 697.295486] ? ___might_sleep+0x163/0x280 [ 697.299645] ? __might_sleep+0x95/0x190 [ 697.303620] ? routing_ioctl+0x580/0x580 [ 697.307774] do_vfs_ioctl+0xd6e/0x1390 [ 697.311670] ? selinux_file_ioctl+0x46f/0x5e0 [ 697.316165] ? selinux_file_ioctl+0x125/0x5e0 [ 697.320661] ? ioctl_preallocate+0x210/0x210 [ 697.325072] ? selinux_file_mprotect+0x620/0x620 [ 697.329837] ? iterate_fd+0x360/0x360 [ 697.333643] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 697.339178] ? fput+0x128/0x1a0 [ 697.342474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.348015] ? security_file_ioctl+0x93/0xc0 [ 697.352427] ksys_ioctl+0xab/0xd0 [ 697.355899] __x64_sys_ioctl+0x73/0xb0 [ 697.359796] do_syscall_64+0x103/0x610 [ 697.363691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.368881] RIP: 0033:0x457e39 00:55:53 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044400000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 697.372085] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.391074] RSP: 002b:00007ff3fd526c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 697.398884] RAX: ffffffffffffffda RBX: 00007ff3fd526c90 RCX: 0000000000457e39 [ 697.406156] RDX: 0000000020000000 RSI: 000000000000890b RDI: 0000000000000004 [ 697.413424] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 697.420701] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3fd5276d4 [ 697.428471] R13: 00000000004c3694 R14: 00000000004d6380 R15: 0000000000000005 00:55:53 executing program 5 (fault-call:4 fault-nth:3): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:53 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004404000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:53 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 697.517997] EXT4-fs (loop3): Invalid log block size: 64 [ 697.576762] FAULT_INJECTION: forcing a failure. [ 697.576762] name failslab, interval 1, probability 0, space 0, times 0 [ 697.588370] CPU: 1 PID: 32444 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 697.595956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.595979] Call Trace: [ 697.596001] dump_stack+0x172/0x1f0 [ 697.596020] should_fail.cold+0xa/0x1b [ 697.596036] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 697.611669] ? mark_held_locks+0x100/0x100 [ 697.611684] ? lock_downgrade+0x810/0x810 [ 697.611706] __should_failslab+0x121/0x190 [ 697.611722] should_failslab+0x9/0x14 [ 697.637135] kmem_cache_alloc_node+0x56/0x710 [ 697.641638] ? atomic_notifier_call_chain+0xc6/0x190 [ 697.646749] __alloc_skb+0xd5/0x5e0 [ 697.650387] ? skb_scrub_packet+0x440/0x440 [ 697.654815] ? kasan_check_read+0x11/0x20 [ 697.659044] ? lwtunnel_get_encap_size+0x5e/0x320 [ 697.663921] inet6_rt_notify+0x101/0x2c0 [ 697.663949] fib6_add+0x276c/0x3420 [ 697.663977] ? fib6_update_sernum_upto_root+0x30/0x30 [ 697.676819] ? lock_acquire+0x16f/0x3f0 [ 697.680808] __ip6_ins_rt+0x54/0x80 [ 697.680827] ip6_route_add+0x5a/0xd0 [ 697.680842] ipv6_route_ioctl+0x29e/0x350 [ 697.680860] ? rt6_purge_dflt_routers+0x8c0/0x8c0 [ 697.688184] ? avc_has_extended_perms+0x8e7/0x10f0 [ 697.688219] ? kasan_check_read+0x11/0x20 [ 697.688239] inet6_ioctl+0x11a/0x1c0 [ 697.697196] sock_do_ioctl+0xe2/0x320 [ 697.697214] ? do_recvmmsg+0x7a0/0x7a0 [ 697.697232] ? kasan_check_read+0x11/0x20 [ 697.697253] ? mark_held_locks+0x100/0x100 [ 697.697293] sock_ioctl+0x331/0x620 [ 697.729714] ? routing_ioctl+0x580/0x580 [ 697.733775] ? __fget+0x340/0x540 [ 697.737249] ? ___might_sleep+0x163/0x280 [ 697.741396] ? __might_sleep+0x95/0x190 [ 697.745376] ? routing_ioctl+0x580/0x580 [ 697.749444] do_vfs_ioctl+0xd6e/0x1390 [ 697.753330] ? selinux_file_ioctl+0x46f/0x5e0 [ 697.757824] ? selinux_file_ioctl+0x125/0x5e0 [ 697.762318] ? ioctl_preallocate+0x210/0x210 [ 697.766726] ? selinux_file_mprotect+0x620/0x620 [ 697.771507] ? iterate_fd+0x360/0x360 [ 697.775309] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 697.780845] ? fput+0x128/0x1a0 [ 697.784140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.789678] ? security_file_ioctl+0x93/0xc0 [ 697.794093] ksys_ioctl+0xab/0xd0 [ 697.797551] __x64_sys_ioctl+0x73/0xb0 [ 697.801452] do_syscall_64+0x103/0x610 [ 697.805345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.810533] RIP: 0033:0x457e39 00:55:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:53 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:54 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 697.813734] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.832628] RSP: 002b:00007ff3fd526c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 697.840332] RAX: ffffffffffffffda RBX: 00007ff3fd526c90 RCX: 0000000000457e39 [ 697.847606] RDX: 0000000020000000 RSI: 000000000000890b RDI: 0000000000000004 [ 697.855006] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 697.862277] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3fd5276d4 [ 697.869546] R13: 00000000004c3694 R14: 00000000004d6380 R15: 0000000000000005 00:55:54 executing program 5 (fault-call:4 fault-nth:4): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 697.926330] EXT4-fs (loop4): Invalid log block size: 101711936 [ 697.941869] EXT4-fs (loop0): Invalid log block size: 64 00:55:54 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044600000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r3) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:54 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 698.056167] EXT4-fs (loop3): Invalid log block size: 64 [ 698.093113] FAULT_INJECTION: forcing a failure. [ 698.093113] name failslab, interval 1, probability 0, space 0, times 0 [ 698.104413] CPU: 0 PID: 32460 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 698.111522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.120871] Call Trace: [ 698.120896] dump_stack+0x172/0x1f0 [ 698.120918] should_fail.cold+0xa/0x1b [ 698.120937] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 698.120954] ? find_held_lock+0x35/0x130 [ 698.120970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.120983] ? should_fail+0x14d/0x85c [ 698.121003] __should_failslab+0x121/0x190 [ 698.131075] should_failslab+0x9/0x14 [ 698.131093] kmem_cache_alloc_node_trace+0x5a/0x720 [ 698.131109] ? __alloc_skb+0xd5/0x5e0 [ 698.131129] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 698.162679] __kmalloc_node_track_caller+0x3d/0x70 [ 698.162699] __kmalloc_reserve.isra.0+0x40/0xf0 [ 698.162715] __alloc_skb+0x10b/0x5e0 [ 698.171944] ? skb_scrub_packet+0x440/0x440 [ 698.171958] ? kasan_check_read+0x11/0x20 [ 698.171977] ? lwtunnel_get_encap_size+0x5e/0x320 [ 698.171999] inet6_rt_notify+0x101/0x2c0 [ 698.202573] fib6_add+0x276c/0x3420 00:55:54 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004504000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x803, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:54 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044700000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 698.202606] ? fib6_update_sernum_upto_root+0x30/0x30 [ 698.202619] ? lock_acquire+0x16f/0x3f0 [ 698.202644] __ip6_ins_rt+0x54/0x80 [ 698.219032] ip6_route_add+0x5a/0xd0 [ 698.222752] ipv6_route_ioctl+0x29e/0x350 [ 698.226903] ? rt6_purge_dflt_routers+0x8c0/0x8c0 [ 698.226929] ? avc_has_extended_perms+0x8e7/0x10f0 [ 698.226963] ? kasan_check_read+0x11/0x20 [ 698.226983] inet6_ioctl+0x11a/0x1c0 [ 698.227003] sock_do_ioctl+0xe2/0x320 [ 698.248388] ? do_recvmmsg+0x7a0/0x7a0 [ 698.252281] ? kasan_check_read+0x11/0x20 [ 698.256439] ? mark_held_locks+0x100/0x100 [ 698.260673] sock_ioctl+0x331/0x620 [ 698.264297] ? routing_ioctl+0x580/0x580 [ 698.268352] ? __fget+0x340/0x540 [ 698.271817] ? ___might_sleep+0x163/0x280 [ 698.275967] ? __might_sleep+0x95/0x190 [ 698.279943] ? routing_ioctl+0x580/0x580 [ 698.284010] do_vfs_ioctl+0xd6e/0x1390 [ 698.287907] ? selinux_file_ioctl+0x46f/0x5e0 [ 698.292412] ? selinux_file_ioctl+0x125/0x5e0 [ 698.296905] ? ioctl_preallocate+0x210/0x210 [ 698.301313] ? selinux_file_mprotect+0x620/0x620 [ 698.306090] ? iterate_fd+0x360/0x360 [ 698.309891] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 698.315519] ? fput+0x128/0x1a0 [ 698.318800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.324336] ? security_file_ioctl+0x93/0xc0 [ 698.328747] ksys_ioctl+0xab/0xd0 [ 698.332203] __x64_sys_ioctl+0x73/0xb0 [ 698.336121] do_syscall_64+0x103/0x610 [ 698.340013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.345317] RIP: 0033:0x457e39 [ 698.348509] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 698.367404] RSP: 002b:00007ff3fd526c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 698.375112] RAX: ffffffffffffffda RBX: 00007ff3fd526c90 RCX: 0000000000457e39 [ 698.382387] RDX: 0000000020000000 RSI: 000000000000890b RDI: 0000000000000004 [ 698.389663] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 698.396926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3fd5276d4 00:55:54 executing program 5 (fault-call:4 fault-nth:5): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 698.404191] R13: 00000000004c3694 R14: 00000000004d6380 R15: 0000000000000005 00:55:54 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:55:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x803, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 698.601552] EXT4-fs (loop1): Invalid log block size: 64 [ 698.607367] EXT4-fs (loop0): Invalid log block size: 64 00:55:54 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x2, &(0x7f0000000000)) 00:55:54 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044800000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:54 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004604000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 698.778222] EXT4-fs (loop3): Invalid log block size: 64 00:55:55 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044900000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x4b47, &(0x7f0000000000)) 00:55:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x803, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r3, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:55 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x14, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 698.932945] EXT4-fs (loop0): Invalid log block size: 64 00:55:55 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044a00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x4b49, &(0x7f0000000000)) 00:55:55 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004704000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 699.081775] EXT4-fs (loop3): Invalid log block size: 64 00:55:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x541b, &(0x7f0000000000)) 00:55:55 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000044b00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x25, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) close(0xffffffffffffffff) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 699.205019] EXT4-fs (loop3): Invalid log block size: 64 [ 699.215813] EXT4-fs (loop0): Invalid log block size: 64 00:55:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x5421, &(0x7f0000000000)) 00:55:55 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004804000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000003a700000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) close(0xffffffffffffffff) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:55 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004904000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3b, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000003b300000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x5450, &(0x7f0000000000)) [ 699.473088] EXT4-fs (loop3): Invalid log block size: 64 00:55:55 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004a04000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) close(0xffffffffffffffff) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:55 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000200000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 699.597726] EXT4-fs (loop3): Invalid log block size: 64 00:55:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x5451, &(0x7f0000000000)) 00:55:55 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:55 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 699.709365] EXT4-fs (loop0): Invalid log block size: 64 00:55:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r2) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r2, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:56 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000300000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x5452, &(0x7f0000000000)) [ 699.798892] EXT4-fs (loop3): Invalid log block size: 64 00:55:56 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004b04000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 699.844497] EXT4-fs (loop3): Invalid log block size: 64 00:55:56 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 699.906177] EXT4-fs (loop0): Invalid log block size: 64 00:55:56 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004c04000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000400000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x5460, &(0x7f0000000000)) 00:55:56 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3a7, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r2) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r2, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 700.020335] EXT4-fs (loop3): Invalid log block size: 64 00:55:56 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000020000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8901, &(0x7f0000000000)) [ 700.120353] EXT4-fs (loop3): Invalid log block size: 64 00:55:56 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000700000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000a00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 700.258472] EXT4-fs (loop0): Invalid log block size: 64 00:55:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8902, &(0x7f0000000000)) 00:55:56 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3b3, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r1) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r1, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 700.339000] EXT4-fs (loop3): Invalid log block size: 64 00:55:56 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000f00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000826000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 700.464803] EXT4-fs (loop3): Invalid log block size: 64 00:55:56 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000001000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8903, &(0x7f0000000000)) 00:55:56 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xc203000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:56 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x427, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000001400000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:56 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000002a26000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 700.633203] EXT4-fs (loop0): Invalid log block size: 64 00:55:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8904, &(0x7f0000000000)) [ 700.704722] EXT4-fs (loop3): Invalid log block size: 64 00:55:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:57 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000002500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8906, &(0x7f0000000000)) 00:55:57 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x428, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:57 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf4ffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 700.845435] EXT4-fs (loop0): Invalid log block size: 64 00:55:57 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000006d000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:57 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000003b00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:57 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8907, &(0x7f0000000000)) 00:55:57 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000000ec000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:57 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000a703000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:57 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x429, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) [ 701.064647] EXT4-fs (loop3): Invalid log block size: 64 00:55:57 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 701.157443] EXT4-fs (loop3): Invalid log block size: 64 00:55:57 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8911, &(0x7f0000000000)) 00:55:57 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000b303000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 701.226817] EXT4-fs (loop0): Invalid log block size: 64 00:55:57 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:57 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x42a, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8914, &(0x7f0000000000)) 00:55:57 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000001fffffff19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 701.364202] EXT4-fs (loop3): Invalid log block size: 64 00:55:57 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000002804000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 701.423917] EXT4-fs (loop3): Invalid log block size: 64 00:55:57 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, 0x0) close(0xffffffffffffffff) r0 = socket(0x200000000000011, 0x803, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:57 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004004000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:57 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x42b, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 701.563014] EXT4-fs (loop0): Invalid log block size: 64 [ 701.566252] EXT4-fs (loop3): Invalid log block size: 64 00:55:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8916, &(0x7f0000000000)) 00:55:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, 0x0) close(0xffffffffffffffff) r0 = socket(0x200000000000011, 0x803, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:57 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000007000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 701.673968] EXT4-fs (loop3): Invalid log block size: 64 00:55:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8918, &(0x7f0000000000)) 00:55:58 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004104000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8936, &(0x7f0000000000)) [ 701.773492] EXT4-fs (loop0): Invalid log block size: 64 00:55:58 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x42c, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, 0x0) close(0xffffffffffffffff) r0 = socket(0x200000000000011, 0x803, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:58 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000102000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004204000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 701.975497] EXT4-fs (loop3): Invalid log block size: 64 00:55:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(0xffffffffffffffff) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:58 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000103000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8940, &(0x7f0000000000)) [ 702.025483] EXT4-fs (loop3): Invalid log block size: 64 00:55:58 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004304000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x432, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(0xffffffffffffffff) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:58 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004404000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8941, &(0x7f0000000000)) [ 702.205861] EXT4-fs (loop0): Invalid log block size: 64 00:55:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(0xffffffffffffffff) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:58 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004504000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000104000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1700, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 702.373582] EXT4-fs (loop3): Invalid log block size: 64 00:55:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000000)) 00:55:58 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004604000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 702.434996] EXT4-fs (loop3): Invalid log block size: 64 00:55:58 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x0, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 702.504765] EXT4-fs (loop0): Invalid log block size: 64 00:55:58 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000105000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004704000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8980, &(0x7f0000000000)) 00:55:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x0, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:58 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 702.686202] EXT4-fs (loop3): Invalid log block size: 64 00:55:59 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004804000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8981, &(0x7f0000000000)) [ 702.763214] EXT4-fs (loop0): Invalid log block size: 64 [ 702.772629] EXT4-fs (loop3): Invalid log block size: 64 00:55:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x0, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:59 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000106000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004904000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x0, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8982, &(0x7f0000000000)) [ 702.970046] EXT4-fs (loop3): Invalid log block size: 64 00:55:59 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x25e8, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 703.013171] EXT4-fs (loop0): Invalid log block size: 64 00:55:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x0, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:59 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000107000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8983, &(0x7f0000000000)) [ 703.090711] EXT4-fs (loop3): Invalid log block size: 64 00:55:59 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004a04000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x0, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:59 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000108000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89a0, &(0x7f0000000000)) 00:55:59 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004b04000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x25f1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:59 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000109000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 703.369681] EXT4-fs (loop3): Invalid log block size: 64 00:55:59 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000020000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 703.456815] EXT4-fs (loop3): Invalid log block size: 64 00:55:59 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010a000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89a1, &(0x7f0000000000)) 00:55:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:59 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000002526000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x25f8, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:55:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:55:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x40049409, &(0x7f0000000000)) 00:55:59 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010b000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 703.652390] EXT4-fs (loop0): Invalid log block size: 64 00:56:00 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000002926000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 703.719164] EXT4-fs (loop3): Invalid log block size: 64 00:56:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x40086602, &(0x7f0000000000)) 00:56:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:00 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000006d000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 703.806438] EXT4-fs (loop3): Invalid log block size: 64 [ 703.830079] EXT4-fs (loop0): Invalid log block size: 64 00:56:00 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:00 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x25fb, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x40087602, &(0x7f0000000000)) 00:56:00 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000123000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:00 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000000fb000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 704.016293] EXT4-fs (loop3): Invalid log block size: 64 00:56:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x4020940d, &(0x7f0000000000)) 00:56:00 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:00 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000f9ffff7f19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 704.085374] EXT4-fs (loop3): Invalid log block size: 64 [ 704.106978] EXT4-fs (loop0): Invalid log block size: 64 00:56:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x80086601, &(0x7f0000000000)) 00:56:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:00 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000012d000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:00 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2607, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:00 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000001fffffff19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 704.306437] EXT4-fs (loop3): Invalid log block size: 64 00:56:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x80087601, &(0x7f0000000000)) 00:56:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 704.370815] EXT4-fs (loop3): Invalid log block size: 64 [ 704.381043] EXT4-fs (loop0): Invalid log block size: 64 00:56:00 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:00 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000007000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:00 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000148000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0xc0045878, &(0x7f0000000000)) 00:56:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:00 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x261a, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:00 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000102000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0xc0045878, &(0x7f0000000000)) [ 704.582314] EXT4-fs (loop3): Invalid log block size: 64 00:56:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 704.666240] EXT4-fs (loop0): Invalid log block size: 64 [ 704.679075] EXT4-fs (loop3): Invalid log block size: 64 00:56:00 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000103000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000014c000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0xc0189436, &(0x7f0000000000)) 00:56:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00'}) bind$packet(r1, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 704.828372] EXT4-fs (loop3): Invalid log block size: 64 [ 704.868725] EXT4-fs (loop3): Invalid log block size: 64 [ 704.888410] EXT4-fs (loop0): Invalid log block size: 64 00:56:01 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2642, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000104000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0xc020660b, &(0x7f0000000000)) 00:56:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00'}) bind$packet(r1, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:01 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000160000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000105000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00'}) bind$packet(r1, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 705.124998] EXT4-fs (loop3): Invalid log block size: 101711936 00:56:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x2000000000000053, &(0x7f0000000180)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f00000001c0)='G\xffL\x00', 0x3, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0xfffffffffffffffe}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:01 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3000, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000106000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000168000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000080), 0x4) 00:56:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00'}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 705.254359] EXT4-fs (loop3): Invalid log block size: 101711936 00:56:01 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 705.338398] EXT4-fs (loop0): Invalid log block size: 64 00:56:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000070000004c000000dd99f3ce9500000000000000c501c53ddac914e0e0d98f16a247bbc6c9c4bf128961154b1993fa4ec1e815c9f1960efa6f0b36edb97d65773fda3677e3c9510e"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00'}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:01 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000016c000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 705.473181] EXT4-fs (loop3): Invalid log block size: 101711936 00:56:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:01 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00'}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:01 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000174000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 705.607199] EXT4-fs (loop0): Invalid log block size: 64 [ 705.626334] EXT4-fs (loop3): Invalid log block size: 101711936 [ 705.748780] EXT4-fs (loop0): Invalid log block size: 64 [ 706.630010] device bridge_slave_1 left promiscuous mode [ 706.635598] bridge0: port 2(bridge_slave_1) entered disabled state [ 706.710431] device bridge_slave_0 left promiscuous mode [ 706.730108] bridge0: port 1(bridge_slave_0) entered disabled state [ 706.894397] device hsr_slave_1 left promiscuous mode [ 706.950697] device hsr_slave_0 left promiscuous mode [ 707.010076] team0 (unregistering): Port device team_slave_1 removed [ 707.029801] team0 (unregistering): Port device team_slave_0 removed [ 707.048244] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 707.101554] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 707.244665] bond0 (unregistering): Released all slaves [ 707.927525] IPVS: ftp: loaded support on port[0] = 21 [ 708.049786] chnl_net:caif_netlink_parms(): no params data found [ 708.138118] bridge0: port 1(bridge_slave_0) entered blocking state [ 708.144551] bridge0: port 1(bridge_slave_0) entered disabled state [ 708.151891] device bridge_slave_0 entered promiscuous mode [ 708.167350] bridge0: port 2(bridge_slave_1) entered blocking state [ 708.173753] bridge0: port 2(bridge_slave_1) entered disabled state [ 708.191974] device bridge_slave_1 entered promiscuous mode [ 708.254472] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 708.267638] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 708.307005] team0: Port device team_slave_0 added [ 708.313168] team0: Port device team_slave_1 added [ 708.408427] device hsr_slave_0 entered promiscuous mode [ 708.446017] device hsr_slave_1 entered promiscuous mode [ 708.575792] 8021q: adding VLAN 0 to HW filter on device bond0 [ 708.616731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 708.624084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 708.638549] 8021q: adding VLAN 0 to HW filter on device team0 [ 708.658251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 708.671230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 708.679824] bridge0: port 1(bridge_slave_0) entered blocking state [ 708.686209] bridge0: port 1(bridge_slave_0) entered forwarding state [ 708.711062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 708.721945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 708.732037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 708.743810] bridge0: port 2(bridge_slave_1) entered blocking state [ 708.750178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 708.763490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 708.771567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 708.795210] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 708.831732] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 708.852533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 708.871662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 708.891491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 708.912115] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 708.936311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 708.943841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 708.957069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 708.964643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 708.992079] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 709.001076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 709.015402] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 709.088477] EXT4-fs (loop1): Invalid log block size: 64 00:56:05 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000107000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85ff0800003ae8190000000000000000fbff1b03237b2070"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3e3, 0x40000) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000140)={0x3, 'syz0\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100), 0x4) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f00000003c0)=0x64) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x13c, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x6c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x1}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5a}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x20}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x69}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x1000}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x1}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2c}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}]}, 0x13c}, 0x1, 0x0, 0x0, 0x40}, 0x20008010) r3 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 00:56:05 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:05 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000017a000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:05 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 709.211382] EXT4-fs (loop3): Invalid log block size: 101711936 [ 709.229199] EXT4-fs (loop0): Invalid log block size: 64 00:56:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000080)={r1}) 00:56:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:05 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001f9000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:05 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000108000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 709.361997] EXT4-fs (loop3): Invalid log block size: 101711936 00:56:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000044c0000b5a876e999f26b757b890000000095007130c35ed875"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:05 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:05 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7ffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 709.509879] EXT4-fs (loop0): Invalid log block size: 64 00:56:05 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000109000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:05 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001fc000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000100)=r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 709.598674] EXT4-fs (loop3): Invalid log block size: 101711936 00:56:05 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010a000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 709.707819] EXT4-fs (loop3): Invalid log block size: 101711936 [ 709.714008] EXT4-fs (loop0): Invalid log block size: 64 00:56:06 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = dup2(r1, r0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000100)={0xa, 0x8, {0x57, 0x7, 0x0, {0x20, 0x9}, {0x4, 0x20}, @ramp={0x9, 0x92, {0x5, 0x8, 0xfff, 0x6}}}, {0x55, 0xa36, 0x4, {0x1b31, 0x3}, {0x8, 0x4}, @const={0x2, {0x7, 0xb10, 0x9, 0xfffffffffffffffc}}}}) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000080)=0x100) 00:56:06 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010b000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:06 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100030019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff88809677d2d8, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x2200, 0x0) ioctl$VIDIOC_G_STD(r3, 0x80085617, &(0x7f0000000140)) 00:56:06 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000123000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000110040019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000012d000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x14, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, 0x0, 0x0) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r0, 0x7, 0x2}, 0x14) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:06 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff88809677d658, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x24001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000100)={0x2, [0x0, 0x0]}, &(0x7f0000000140)=0xc) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:06 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000148000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 710.257996] EXT4-fs (loop0): Invalid log block size: 64 00:56:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, 0x0, 0x0) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:06 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100050019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3b, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85ecff00070002004c000000000000009500180000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:06 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000014c000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100060019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, 0x0, 0x0) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:06 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100070019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0xffdf, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={r1}) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000080)={@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt(r2, 0x7fff, 0x8, &(0x7f0000000100)=""/34, &(0x7f0000000140)=0x22) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000180)={@ipv4={[], [], @initdev}}, &(0x7f00000001c0)=0x14) 00:56:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400), 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 710.596593] EXT4-fs (loop1): Invalid log block size: 64 00:56:06 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000160000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x10c958544b1a1588, &(0x7f000045c000)=ANY=[], &(0x7f0000281ffc)='G\xffL\x00', 0x5, 0xffffffffffffffac}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0x7, &(0x7f0000000800)=0x1, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r3 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0xffffffff, 0x101000) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x10, &(0x7f0000000440)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@version_u='version=9p2000.u'}, {@access_any='access=any'}, {@access_user='access=user'}, {@access_any='access=any'}, {@fscache='fscache'}, {@noextend='noextend'}, {@mmap='mmap'}, {@privport='privport'}, {@cache_mmap='cache=mmap'}, {@cache_mmap='cache=mmap'}], [{@audit='audit'}, {@obj_role={'obj_role', 0x3d, '.cgroup}'}}, {@smackfsfloor={'smackfsfloor'}}, {@smackfsroot={'smackfsroot', 0x3d, 'vboxnet1em0\x14self-'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@obj_user={'obj_user', 0x3d, 'system_u:object_r:udev_tbl_t:s0\x00'}}, {@smackfshat={'smackfshat'}}, {@appraise_type='appraise_type=imasig'}]}}) r4 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000580)={0x1, 0x81, 0x5, {0x3, @vbi={0x81, 0x7, 0x9923, 0x797e7f5b, [0x0, 0x80], [0x4, 0x2], 0x10b}}}) ioctl$VIDIOC_G_FMT(r4, 0xc0d05604, &(0x7f0000000180)={0x3, @pix={0x10001, 0x0, 0x43353039, 0x3, 0xffffffff, 0x5, 0x0, 0x20, 0x1, 0x2, 0x1, 0x7}}) write$tun(r4, &(0x7f0000000100)={@val={0x0, 0x8808}, @val={0x3, 0x0, 0x8, 0x5, 0x0, 0x1f}, @arp=@generic={0x11b, 0xf, 0x6, 0x1, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 'D', @broadcast, "9aebec43222e272ef0eacf4e301cd024"}}, 0x33) write$selinux_context(r4, &(0x7f0000000140)='system_u:object_r:udev_tbl_t:s0\x00', 0x20) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000300)=""/136) 00:56:07 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3e, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400), 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 710.755398] EXT4-fs (loop0): Invalid log block size: 64 00:56:07 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100090019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:07 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000168000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:07 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000200000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000140)='em1/\x00') r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f0000000080)={0x0, 0x1ed, 0x1}) 00:56:07 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000a0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:07 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000016c000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400), 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 711.016416] EXT4-fs (loop1): Invalid log block size: 64 00:56:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x20000000000001ed, &(0x7f0000000140)=@raw=[@generic={0x3, 0x7, 0xb0ce, 0x5c, 0x689}, @jmp={0x5, 0x9, 0xd, 0x0, 0x9, 0xfffffffffffffffe, 0x1}, @alu={0x4, 0x100000001, 0x4, 0x5, 0x6, 0x124de0f60d29193, 0x1}, @call={0x85, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x43}], &(0x7f0000281ffc)='GPL\x00'}, 0xffffffffffffff80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000080)={r1}) [ 711.131855] EXT4-fs (loop4): Invalid log block size: 64 00:56:07 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3b3, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000070000004c000400000000009500000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0xffffffff80000000, 0x5, 0x22, 0x9, 0x3, 0x3f, 0x1ff, 0x295, 0x38, 0xce, 0x3ff, 0x3ff, 0x20, 0x2, 0x0, 0x1, 0x7}, [{0x70000006, 0x5, 0x8, 0x8, 0x7fffffff, 0x4, 0x7fff, 0x7}, {0x70000001, 0x4, 0x7, 0x8, 0x3, 0x9, 0x7ff, 0x7e000}], "", [[], [], []]}, 0x378) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000480)={r1}) 00:56:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 711.184363] EXT4-fs (loop1): Invalid log block size: 64 00:56:07 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800200000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:07 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000b0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 711.277944] EXT4-fs (loop0): Invalid log block size: 64 00:56:07 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000174000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x120000000007, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 711.383561] EXT4-fs (loop4): Invalid log block size: 64 00:56:07 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000017a000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x7, 0x0) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:08 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800300000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:08 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001fc000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:08 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x428, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 711.943979] EXT4-fs (loop4): Invalid log block size: 64 00:56:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, 0x0, 0x0) 00:56:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000140)={0x3, 0x9, 0x4, 0x2004000, {0x0, 0x2710}, {0x3, 0x1, 0xff, 0x7, 0x0, 0x9, "069f94c5"}, 0x0, 0x0, @planes=&(0x7f0000000100)={0x100000000, 0xf7b0, @userptr=0x9, 0x2a2}, 0x4}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x100000002, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) [ 712.051214] EXT4-fs (loop1): Invalid log block size: 64 [ 712.757361] device bridge_slave_1 left promiscuous mode [ 712.762934] bridge0: port 2(bridge_slave_1) entered disabled state [ 712.817264] device bridge_slave_0 left promiscuous mode [ 712.822763] bridge0: port 1(bridge_slave_0) entered disabled state [ 713.072911] device hsr_slave_1 left promiscuous mode [ 713.134025] device hsr_slave_0 left promiscuous mode [ 713.211707] team0 (unregistering): Port device team_slave_1 removed [ 713.252021] team0 (unregistering): Port device team_slave_0 removed [ 713.284067] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 713.344511] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 713.471691] bond0 (unregistering): Released all slaves [ 714.431013] IPVS: ftp: loaded support on port[0] = 21 [ 714.616321] chnl_net:caif_netlink_parms(): no params data found [ 714.724721] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.740860] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.748497] device bridge_slave_0 entered promiscuous mode [ 714.761160] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.767596] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.774733] device bridge_slave_1 entered promiscuous mode [ 714.804918] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 714.815506] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 714.842555] team0: Port device team_slave_0 added [ 714.852342] team0: Port device team_slave_1 added [ 714.940202] device hsr_slave_0 entered promiscuous mode [ 714.986199] device hsr_slave_1 entered promiscuous mode [ 715.044476] bridge0: port 2(bridge_slave_1) entered blocking state [ 715.050898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 715.057540] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.063913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 715.152210] 8021q: adding VLAN 0 to HW filter on device bond0 [ 715.197888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 715.205568] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.231129] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.249963] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 715.282699] 8021q: adding VLAN 0 to HW filter on device team0 [ 715.309373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 715.319924] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.326320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 715.371105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 715.382031] bridge0: port 2(bridge_slave_1) entered blocking state [ 715.388416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 715.423336] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 715.440320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 715.454904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 715.469363] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 715.480669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 715.491222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 715.514101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 715.524174] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 715.545871] 8021q: adding VLAN 0 to HW filter on device batadv0 00:56:11 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000104100019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:11 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800400000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, 0x0, 0x0) 00:56:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000100)=""/157) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:11 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100030019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:11 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x42a, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:12 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000120100019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 715.748469] EXT4-fs (loop1): Invalid log block size: 64 [ 715.769688] EXT4-fs (loop4): Invalid log block size: 64 00:56:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, 0x0, 0x0) 00:56:12 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000110040019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000070000004c00000009000000951c000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:12 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800500000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 715.919067] EXT4-fs (loop0): Invalid log block size: 64 00:56:12 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x42b, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000), 0x0) 00:56:12 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100200019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x248, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 716.022103] EXT4-fs (loop1): Invalid log block size: 64 [ 716.049204] EXT4-fs (loop4): Invalid log block size: 64 00:56:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000), 0x0) 00:56:12 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000110200019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:12 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100050019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:12 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800600000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:12 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in=@initdev, @in=@local}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000), 0x0) 00:56:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r0, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) fcntl$notify(r1, 0x402, 0x4) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x82) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x325) [ 716.307995] EXT4-fs (loop1): Invalid log block size: 64 [ 716.316692] EXT4-fs (loop4): Invalid log block size: 64 [ 716.330954] EXT4-fs (loop0): Invalid log block size: 64 00:56:12 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x45c, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418c", 0x7) 00:56:12 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800700000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'ifb0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xb, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81e, 0x0, 0x0, 0x0, 0xef8b}, [@call={0x85, 0x0, 0x0, 0x3a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xb9}, @jmp={0x5, 0xfff, 0x2, 0xf, 0xb, 0xffffffffffffffff, 0x9}, @map={0x18, 0xe, 0x1, 0x0, r2}, @alu={0x4, 0x2, 0xf, 0x0, 0x2, 0x40, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8656, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000180)='GPL\x00', 0x7, 0x19, &(0x7f00000001c0)=""/25, 0x41f00, 0x1, [], r3, 0xb}, 0x48) 00:56:12 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100060019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418c", 0x7) 00:56:12 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100230019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 716.623597] EXT4-fs (loop4): Invalid log block size: 64 00:56:12 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800800000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 716.717436] EXT4-fs (loop0): Invalid log block size: 64 [ 716.725011] EXT4-fs (loop1): Invalid log block size: 64 00:56:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418c", 0x7) 00:56:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x24a040, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x6c5) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 00:56:13 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x45f, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:13 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100070019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:13 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001002d0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 716.929148] EXT4-fs (loop4): Invalid log block size: 64 00:56:13 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800900000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:13 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100090019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd", 0xb) 00:56:13 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001003f0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 717.090489] EXT4-fs (loop4): Invalid log block size: 64 00:56:13 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x460, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:13 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800a00000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 717.234799] EXT4-fs (loop1): Invalid log block size: 64 00:56:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd", 0xb) [ 717.319712] EXT4-fs (loop0): Invalid log block size: 64 00:56:13 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100400019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x800000008, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000080)={r1}) [ 717.367748] EXT4-fs (loop4): Invalid log block size: 64 00:56:13 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000a0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd", 0xb) 00:56:13 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x473, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:13 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800b00000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 717.534061] EXT4-fs (loop0): Invalid log block size: 64 [ 717.562109] EXT4-fs (loop1): Invalid log block size: 64 00:56:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000070000004c00000000000000950000000000000074c2c085ff03f28cea08c32c648b63540d8ebe82c8d9470eba0fc9f8fa8917aa305b6e3276b280f4277d1b3657f88b236bf2cf37fe225d553fc86542b3ecd41418adec7dea01c616"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13da", 0xd) 00:56:13 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100480019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:13 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000b0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 717.685838] EXT4-fs (loop4): Invalid log block size: 64 00:56:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000004c000000006ca99e1260f37acc3fd565917900000095000000da6eb923"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x70, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) uname(&(0x7f0000000400)=""/209) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:14 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="802300000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13da", 0xd) 00:56:14 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x477, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 717.777559] EXT4-fs (loop0): Invalid log block size: 64 [ 717.783257] EXT4-fs (loop1): Invalid log block size: 64 00:56:14 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001004c0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x80, 0x101000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000240)={@empty, @loopback, r2}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r3 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 00:56:14 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000104100019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 717.897973] EXT4-fs (loop4): Invalid log block size: 64 00:56:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13da", 0xd) 00:56:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x5, @remote, 0x5}, r2}}, 0x30) r3 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 00:56:14 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100600019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:14 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="802d00000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:14 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000120100019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = dup2(r1, r0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000100)={0xa, 0x8, {0x57, 0x7, 0x0, {0x20, 0x9}, {0x4, 0x20}, @ramp={0x9, 0x92, {0x5, 0x8, 0xfff, 0x6}}}, {0x55, 0xa36, 0x4, {0x1b31, 0x3}, {0x8, 0x4}, @const={0x2, {0x7, 0xb10, 0x9, 0xfffffffffffffffc}}}}) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000080)=0x100) 00:56:14 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100680019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 718.079394] EXT4-fs (loop0): Invalid log block size: 64 00:56:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000070000004c00775dd5ba0aed7f9e000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:14 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2400, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:14 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100200019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 718.165232] EXT4-fs (loop4): Invalid log block size: 64 00:56:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:14 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="804800000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:14 executing program 2 (fault-call:7 fault-nth:0): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 718.294660] EXT4-fs (loop0): Invalid log block size: 64 [ 718.304434] EXT4-fs (loop1): Invalid log block size: 64 00:56:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000870000004c00000000000000003739f96b7f44b4e61418371e36000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f0000000100)="3b1163cd78b89e1ba101df682bb0", 0x0, 0x40}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:14 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000110200019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 718.398207] FAULT_INJECTION: forcing a failure. [ 718.398207] name failslab, interval 1, probability 0, space 0, times 0 [ 718.420175] CPU: 1 PID: 1581 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60 [ 718.427216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.436564] Call Trace: [ 718.439157] dump_stack+0x172/0x1f0 [ 718.442796] should_fail.cold+0xa/0x1b [ 718.446690] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 718.451801] ? lock_downgrade+0x810/0x810 [ 718.455957] ? ___might_sleep+0x163/0x280 [ 718.460110] __should_failslab+0x121/0x190 [ 718.464348] should_failslab+0x9/0x14 [ 718.468146] kmem_cache_alloc_node+0x265/0x710 [ 718.472817] ? ima_match_policy+0xa19/0x13d0 [ 718.477225] ? process_measurement+0xd5d/0x1570 [ 718.481909] __alloc_skb+0xd5/0x5e0 [ 718.485538] ? skb_scrub_packet+0x440/0x440 [ 718.489858] ? lock_downgrade+0x810/0x810 [ 718.494010] alloc_skb_with_frags+0x93/0x580 [ 718.498416] ? mark_held_locks+0x100/0x100 [ 718.502646] ? find_held_lock+0x35/0x130 [ 718.506707] ? avc_has_perm+0x379/0x610 [ 718.510686] sock_alloc_send_pskb+0x72d/0x8a0 [ 718.515255] ? packet_cached_dev_get+0x148/0x260 [ 718.520014] ? sock_wmalloc+0x120/0x120 [ 718.523989] ? lock_downgrade+0x810/0x810 [ 718.528142] ? kasan_check_read+0x11/0x20 [ 718.532310] packet_sendmsg+0x17d7/0x5ab0 [ 718.536460] ? __lock_acquire+0x53b/0x4700 [ 718.540713] ? packet_getname+0x5f0/0x5f0 [ 718.544885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.550427] ? selinux_socket_sendmsg+0x36/0x40 [ 718.555094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.560633] ? security_socket_sendmsg+0x93/0xc0 [ 718.565404] ? packet_getname+0x5f0/0x5f0 [ 718.569555] sock_sendmsg+0xdd/0x130 [ 718.573280] sock_write_iter+0x27c/0x3e0 [ 718.577342] ? sock_sendmsg+0x130/0x130 [ 718.581317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.586864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 718.592401] ? iov_iter_init+0xea/0x220 [ 718.596381] __vfs_write+0x613/0x8e0 [ 718.600097] ? kernel_read+0x120/0x120 [ 718.603985] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.609537] ? rw_verify_area+0x118/0x360 [ 718.613687] vfs_write+0x20c/0x580 [ 718.617230] ksys_write+0xea/0x1f0 [ 718.620789] ? __ia32_sys_read+0xb0/0xb0 [ 718.624851] ? do_syscall_64+0x26/0x610 [ 718.628831] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.634201] ? do_syscall_64+0x26/0x610 [ 718.638178] __x64_sys_write+0x73/0xb0 [ 718.642069] do_syscall_64+0x103/0x610 [ 718.645960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.651143] RIP: 0033:0x457e39 [ 718.654352] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.673254] RSP: 002b:00007fa237154c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 718.680963] RAX: ffffffffffffffda RBX: 00007fa237154c90 RCX: 0000000000457e39 [ 718.688229] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000003 00:56:15 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001006c0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 718.695502] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 718.702767] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2371556d4 [ 718.710033] R13: 00000000004c3b8d R14: 00000000004dc278 R15: 0000000000000005 [ 718.739484] EXT4-fs (loop4): Invalid log block size: 64 00:56:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xfffffffffffffc44, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0xfffffffffffffcc9) r1 = socket$kcm(0xa, 0x800000007, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/rtc0\x00', 0x1c3cc2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000e80)={0x0, 0x0}) write$P9_RGETLOCK(r2, &(0x7f0000000ec0)={0x1f, 0x37, 0x1, {0x1, 0x0, 0x2f7e9dc0, r3, 0x1, '%'}}, 0x1f) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r4 = socket$inet(0x2, 0x80b, 0x3) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000e00)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r5, 0x4008700c, 0xa10) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000740)=@broute={'broute\x00', 0x20, 0x5, 0x638, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000080), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x1d, 0x38, 0x893f, 'ip6tnl0\x00', 'rose0\x00', 'veth0_to_bond\x00', 'veth1_to_hsr\x00', @local, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], @broadcast, [0xff, 0xe9259c1002b1cf9f, 0x74c6eed6bbb2bd2f, 0xff, 0xff], 0xb8, 0x140, 0x178, [@limit={'limit\x00', 0x20, {{0x1, 0x3ff, 0x2, 0x4f22, 0x1, 0x80000001}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffd}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x401, 'syz0\x00', 0x2}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@remote, 0xfffffffffffffffe}}}}, {{{0xf, 0x20, 0x8848, 'rose0\x00', 'bond0\x00', 'syz_tun\x00', 'veth1_to_bond\x00', @empty, [0x0, 0xff, 0x0, 0x0, 0xff], @empty, [0x0, 0xff, 0x0, 0x0, 0xff], 0xb0, 0xb0, 0x128, [@quota={'quota\x00', 0x18, {{0x0, 0x0, 0x1, 0x9}}}]}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x6, 0x1, 0x6, 0x0, 0x0, "2bdfafd785adf82250b50eacac4f6c14b5914a4dfca9cb9af47d5f19047aa138c4e7e6c5188a59f9778336dbf17fdc20e77c0db22b7ba8dda26e4dd6eace6c50"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x1d, 0x4, 0xff, '\x00', 'lo\x00', 'team_slave_1\x00', 'syzkaller0\x00', @empty, [0x0, 0xff], @broadcast, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0x70, 0xa8, 0xe0}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xffffffffffffffff}}}]}, @common=@mark={'mark\x00', 0x10, {{0xffffffd0, 0xffffffffffffffff}}}}, {{{0x9, 0x1, 0x9b05, 'ip6gretap0\x00', 'bridge_slave_1\x00', 'bond_slave_1\x00', 'veth0_to_bridge\x00', @empty, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xb0, 0xf8, 0x148, [@quota={'quota\x00', 0x18, {{0x1, 0x0, 0x6, 0x3}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x3, 0x5, 0x9}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x9, 'syz0\x00', 0x101}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0xb, 0x5, 0xe105, 'team_slave_0\x00', 'veth1_to_bond\x00', 'hwsim0\x00', 'veth1_to_bridge\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @dev={[], 0xd}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0xb0, 0xb0, 0xe0, [@mark_m={'mark_m\x00', 0x18, {{0x2, 0x8, 0x3, 0x2}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x8001}}}}]}]}, 0x6b0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000840)=@mangle={'mangle\x00', 0x1f, 0x6, 0x530, 0x2f0, 0x3d8, 0x2f0, 0x228, 0x3d8, 0x498, 0x498, 0x498, 0x498, 0x498, 0x6, &(0x7f00000007c0), {[{{@ip={@local, @loopback, 0xff000000, 0xffffffff, 'bridge_slave_0\x00', 'bpq0\x00', {}, {}, 0x1, 0x3}, 0x0, 0x98, 0xd8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x6, 0x1, @ipv6=@ipv4={[], [], @empty}, 0x4e22}}}, {{@ip={@broadcast, @remote, 0xffffffff, 0xff000000, 'veth1_to_team\x00', 'batadv0\x00', {}, {0xff}, 0x19, 0x3, 0x4}, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x304, 0x242}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x7, [0x2, 0xaa47, 0x9ba, 0xff, 0x53f, 0x4], 0x1, 0x6}, {0x800, [0x7ff, 0xfff, 0x1f, 0xe2b8, 0xe19a, 0xf6a], 0xff, 0x1}}}}, {{@uncond, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x7ff, 0x8, @rand_addr=0x3, 0x4e20}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x73b, 0x6}}}, {{@ip={@local, @empty, 0xffffff00, 0xffffffff, '\x00', 'eql\x00', {0xff}, {}, 0x5e, 0x3, 0x8}, 0x0, 0x98, 0xc0}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x590) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:15 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="804c00000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:15 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100230019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:15 executing program 2 (fault-call:7 fault-nth:1): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:15 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x25f7, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 718.857118] EXT4-fs (loop0): Invalid log block size: 64 00:56:15 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100740019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 718.956635] EXT4-fs (loop4): Invalid log block size: 64 [ 718.963947] FAULT_INJECTION: forcing a failure. [ 718.963947] name failslab, interval 1, probability 0, space 0, times 0 [ 719.004523] CPU: 0 PID: 1608 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60 [ 719.011565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.020918] Call Trace: [ 719.023519] dump_stack+0x172/0x1f0 [ 719.027157] should_fail.cold+0xa/0x1b [ 719.031056] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 719.036164] ? lock_downgrade+0x810/0x810 [ 719.040331] ? ___might_sleep+0x163/0x280 [ 719.044495] __should_failslab+0x121/0x190 [ 719.048744] should_failslab+0x9/0x14 [ 719.052563] kmem_cache_alloc_node_trace+0x270/0x720 [ 719.057670] ? __alloc_skb+0xd5/0x5e0 [ 719.061483] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 719.066939] __kmalloc_node_track_caller+0x3d/0x70 [ 719.071880] __kmalloc_reserve.isra.0+0x40/0xf0 [ 719.076558] __alloc_skb+0x10b/0x5e0 [ 719.080275] ? skb_scrub_packet+0x440/0x440 [ 719.084604] ? lock_downgrade+0x810/0x810 [ 719.088768] alloc_skb_with_frags+0x93/0x580 [ 719.093181] ? mark_held_locks+0x100/0x100 [ 719.097500] ? find_held_lock+0x35/0x130 [ 719.101563] ? avc_has_perm+0x379/0x610 [ 719.105540] sock_alloc_send_pskb+0x72d/0x8a0 [ 719.110047] ? packet_cached_dev_get+0x148/0x260 [ 719.114826] ? sock_wmalloc+0x120/0x120 [ 719.118890] ? lock_downgrade+0x810/0x810 [ 719.123045] ? kasan_check_read+0x11/0x20 [ 719.127202] packet_sendmsg+0x17d7/0x5ab0 [ 719.131352] ? __lock_acquire+0x53b/0x4700 [ 719.135604] ? packet_getname+0x5f0/0x5f0 [ 719.139761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.145311] ? selinux_socket_sendmsg+0x36/0x40 [ 719.149994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.155543] ? security_socket_sendmsg+0x93/0xc0 [ 719.160308] ? packet_getname+0x5f0/0x5f0 [ 719.164457] sock_sendmsg+0xdd/0x130 [ 719.168174] sock_write_iter+0x27c/0x3e0 [ 719.172243] ? sock_sendmsg+0x130/0x130 [ 719.176219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.181771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.187310] ? iov_iter_init+0xea/0x220 [ 719.191293] __vfs_write+0x613/0x8e0 [ 719.195017] ? kernel_read+0x120/0x120 [ 719.198904] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 719.204463] ? rw_verify_area+0x118/0x360 [ 719.208617] vfs_write+0x20c/0x580 [ 719.212165] ksys_write+0xea/0x1f0 [ 719.215718] ? __ia32_sys_read+0xb0/0xb0 [ 719.219792] ? do_syscall_64+0x26/0x610 [ 719.223772] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.229140] ? do_syscall_64+0x26/0x610 [ 719.233126] __x64_sys_write+0x73/0xb0 [ 719.237035] do_syscall_64+0x103/0x610 [ 719.240933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.246123] RIP: 0033:0x457e39 [ 719.249323] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 719.268228] RSP: 002b:00007fa237154c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 719.275942] RAX: ffffffffffffffda RBX: 00007fa237154c90 RCX: 0000000000457e39 [ 719.283208] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000003 [ 719.290477] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 719.297741] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2371556d4 00:56:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2000000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x10, 0x80000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='GPL+-\x00'}, 0x30) write$P9_RGETLOCK(r2, &(0x7f00000003c0)={0x2a, 0x37, 0x2, {0x1, 0x6, 0x7ff, r3, 0xc, 'cpusetvmnet0'}}, 0x2a) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="6fa5d6b8d920e9a98fc065e5de833ab43be77384b58bc01921e5e408c1ffb45630924efd6c68087545e46315154c66b0386b33e5e501124cc0093edddf166ce3baac199894e376e65cf109ceaf74053fca5222ee43b91bf1d06b51f3bd3bd0635055934053b822230026fed8f5f259529b11955d32ce9d6a26ef8a9b0e418b34a99d1192db67ab513f8a3994fa4c0e7cf6803a34049659107c93312988a85fecb376191befb510e2e2c2917c12edf93122d1f89afd3d91321339f152084081ebd432399ec0e7c04be425503e4bbd0180d304101b97"], &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:15 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001007a0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:15 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2602, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 719.480659] FAULT_INJECTION: forcing a failure. [ 719.480659] name failslab, interval 1, probability 0, space 0, times 0 [ 719.494314] EXT4-fs (loop4): Invalid log block size: 64 [ 719.509253] EXT4-fs (loop0): Invalid log block size: 64 [ 719.525226] CPU: 0 PID: 1633 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60 [ 719.532268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.541633] Call Trace: [ 719.544241] dump_stack+0x172/0x1f0 [ 719.547894] should_fail.cold+0xa/0x1b [ 719.551793] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 719.556921] ? lock_downgrade+0x810/0x810 [ 719.561079] ? ___might_sleep+0x163/0x280 [ 719.565240] __should_failslab+0x121/0x190 [ 719.569484] should_failslab+0x9/0x14 [ 719.573287] kmem_cache_alloc_node_trace+0x270/0x720 [ 719.578393] ? __alloc_skb+0xd5/0x5e0 [ 719.582197] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 719.587662] __kmalloc_node_track_caller+0x3d/0x70 [ 719.592902] __kmalloc_reserve.isra.0+0x40/0xf0 [ 719.597578] __alloc_skb+0x10b/0x5e0 [ 719.601295] ? skb_scrub_packet+0x440/0x440 [ 719.605673] ? lock_downgrade+0x810/0x810 [ 719.609832] alloc_skb_with_frags+0x93/0x580 [ 719.614239] ? mark_held_locks+0x100/0x100 [ 719.618470] ? find_held_lock+0x35/0x130 [ 719.622530] ? avc_has_perm+0x379/0x610 [ 719.626509] sock_alloc_send_pskb+0x72d/0x8a0 [ 719.631013] ? packet_cached_dev_get+0x148/0x260 [ 719.635777] ? sock_wmalloc+0x120/0x120 [ 719.639750] ? lock_downgrade+0x810/0x810 [ 719.643901] ? kasan_check_read+0x11/0x20 [ 719.648078] packet_sendmsg+0x17d7/0x5ab0 [ 719.652232] ? __lock_acquire+0x53b/0x4700 [ 719.656572] ? packet_getname+0x5f0/0x5f0 [ 719.660727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.666270] ? selinux_socket_sendmsg+0x36/0x40 [ 719.670936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.676560] ? security_socket_sendmsg+0x93/0xc0 [ 719.681315] ? packet_getname+0x5f0/0x5f0 [ 719.685473] sock_sendmsg+0xdd/0x130 [ 719.689202] sock_write_iter+0x27c/0x3e0 [ 719.693268] ? sock_sendmsg+0x130/0x130 [ 719.697245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.702802] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.708340] ? iov_iter_init+0xea/0x220 [ 719.712322] __vfs_write+0x613/0x8e0 [ 719.716042] ? kernel_read+0x120/0x120 [ 719.719932] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 719.725482] ? rw_verify_area+0x118/0x360 [ 719.729660] vfs_write+0x20c/0x580 [ 719.733208] ksys_write+0xea/0x1f0 [ 719.736763] ? __ia32_sys_read+0xb0/0xb0 [ 719.740826] ? do_syscall_64+0x26/0x610 [ 719.744800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.750165] ? do_syscall_64+0x26/0x610 [ 719.754142] __x64_sys_write+0x73/0xb0 [ 719.758038] do_syscall_64+0x103/0x610 [ 719.761933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.767120] RIP: 0033:0x457e39 [ 719.770312] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 719.789297] RSP: 002b:00007fa237154c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 719.797006] RAX: ffffffffffffffda RBX: 00007fa237154c90 RCX: 0000000000457e39 [ 719.804267] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000003 [ 719.811530] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 719.818796] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2371556d4 00:56:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='G\xffL\x00', 0x0) keyctl$setperm(0x5, r2, 0x200) 00:56:16 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001003f0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 719.826067] R13: 00000000004c3b8d R14: 00000000004dc278 R15: 0000000000000005 00:56:16 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100f90019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:16 executing program 2 (fault-call:7 fault-nth:3): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='limits\x00') getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000100)={0x0, 0xcc32}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x10001}, &(0x7f00000001c0)=0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r3 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000500)=0xe8) sendto$packet(r1, &(0x7f0000000200)="3faecb1b8c328d2564dd8d20fcc1912dbfe9d1b54ca38d18bda27b6a76e5196c9562817ca808a9f85fd9457c9e29ccf8906734f0255d861ebc7e7a96391c5cfe68f3ac42db3b030fec770d4dbcadbfa3bc70b6398653a36ac6847b3b0428a6e36706c25125e488a39eb9f7cde13af3834ce8c5a2afff9bc24b95840f4ce117594b98c1cb2fba4cc3f0ca832d8d97a051919be531ea61b0bcd7fdb0b2267f3087980f5a0cc4d628ce57b1e320d7a41ffc80387d1acd6fa70e233556ab43db96737808ebc6e74ff064f55558dfa9f8337a100c4e96144193b4c0762c00d185bbb02b06f8", 0xe3, 0x20000880, &(0x7f0000000540)={0x11, 0xff, r4, 0x1, 0x5, 0x6, @random="050744bd2d42"}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 00:56:16 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="806800000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:16 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2606, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 720.081648] EXT4-fs (loop0): Invalid log block size: 64 [ 720.084595] EXT4-fs (loop1): Invalid log block size: 64 00:56:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:16 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100fc0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:16 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100400019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000070000004c000000000000009500000000000000385404cead6900e503c29341f05a767b12de5ba736064f979f41be174025e309f9d27717f9a2ff840767d872e5888a9f6479332ef436516d2cc0d66b60c70ed74b21a76911b81e"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x40200, 0x0) write$vhci(r2, &(0x7f0000000180)=@HCI_ACLDATA_PKT={0x2, "3b43d7dcaf377275d5bec538cc33d191173ce8d9d40834af06b8a6d41c06c52065fef8ae813a9c97"}, 0x29) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 720.238231] EXT4-fs (loop4): Invalid log block size: 64 00:56:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x54, 0x40800) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 720.280677] EXT4-fs (loop1): Invalid log block size: 64 [ 720.301171] EXT4-fs (loop0): Invalid log block size: 64 00:56:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000000080)='G\xffL\x00'}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x480400, 0x0) recvmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/10, 0xa}, {&(0x7f0000000200)=""/24, 0x18}, {&(0x7f0000000240)=""/56, 0x38}, {&(0x7f0000000280)=""/9, 0x9}, {&(0x7f00000002c0)=""/214, 0xd6}, {&(0x7f00000003c0)=""/57, 0x39}], 0x6, &(0x7f0000000480)=""/8, 0x8}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 00:56:16 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100480019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:16 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010fff0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:16 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="806c00000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:16 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001004c0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:16 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2610, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x301002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/19) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x200001, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) r5 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3ff, 0x1) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000300)) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000200)={'bridge_slave_0\x00'}) getsockname(r5, &(0x7f00000004c0)=@ipx, &(0x7f0000000380)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vcan0\x00', 0x0}) r7 = semget(0x3, 0x1, 0x40) semctl$SETALL(r7, 0x0, 0x11, &(0x7f00000000c0)=[0x79fd05da, 0x93, 0x81, 0x5, 0x1000, 0x0]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000002000)={@local, 0x7e, r6}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x1, 0xfddb) setsockopt$inet_int(r4, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) r8 = dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f00000003c0)) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r9, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) fcntl$dupfd(r8, 0x406, r1) r10 = semget$private(0x0, 0x7, 0x400) semtimedop(r10, &(0x7f0000000140)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r10, &(0x7f0000000040)=[{0x0, 0x7fffffff}, {}], 0x2) semctl$SETALL(r10, 0x0, 0x11, &(0x7f0000000080)=[0x1]) 00:56:16 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000002d000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 720.562196] EXT4-fs (loop0): Invalid log block size: 64 00:56:16 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100600019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0x7, 0x3}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 720.660165] EXT4-fs (loop4): Invalid log block size: 64 00:56:17 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="807400000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:17 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100680019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 720.779691] EXT4-fs (loop0): Invalid log block size: 64 00:56:17 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000f9000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x2, 0x4, 0xccd, 0x6, 0x4, 0xe9, 0x8, {0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x7, 0x4, 0x5, 0xffffffff, 0x4}}, &(0x7f0000000280)=0xb0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000002c0)={r2, 0x7}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r3 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$SIOCGETLINKNAME(r4, 0x89e0, &(0x7f0000000100)={0x0, 0x2}) [ 720.931472] EXT4-fs (loop4): Invalid log block size: 64 [ 720.950762] EXT4-fs (loop1): Invalid log block size: 64 00:56:17 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="807a00000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:17 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x263e, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:17 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100020019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000300)={0x18, 0x1, 0x0, {0xfffffffffffffbff}}, 0x18) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0x1, 0x6f0}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e24, 0x100, @empty, 0x680}}, 0x6, 0x8, 0x40, 0x0, 0x8}, 0x98) r4 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x2000000000006, 0x20000002}, 0xffffffffffffff6a) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000340)={r4}) [ 721.092876] EXT4-fs (loop4): Invalid log block size: 64 [ 721.179668] EXT4-fs (loop0): Invalid log block size: 64 00:56:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000080)) r1 = socket(0x0, 0xa, 0x8000000000) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f00000000c0)) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000180)={0x10, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0f63611a26686dc02157d755e202157106022c3a5ed4fb7b4bf53d9302baec0e1c296bb44da47fa9270de064d21d55aa2c6be68d551a43ab38d732630a38e1ee3582dc216ccea2e5d102f829a49b8410e46b9e4e68463e6eadf14d2820609c3658fca15af3250b"], 0x55, 0x0, &(0x7f0000000100)="a1e5da763595373b66cd3601ed370395db36540ac72484d671c5467f79fd0195e2e2521e8b1eb2567981cba27b39d0777e4b57fc13aa765e7fe6fe66e4bf4070e886851cdf9d8f1fd03bfa614f3aad5e57326a02b3"}) write(r1, &(0x7f00000001c0)="000091aac80100ae08000000878c", 0xe) socket$isdn_base(0x22, 0x3, 0x0) 00:56:17 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80fc00000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:17 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001006c0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000070000004c000000000000009500000000000000d7b05fee50f9a723974fddbaeefbfb67da95551fb1257a8da6425a273f9d8d6b4b2f6977924b1387626389a679ca1db8ece7956e0926dad20a572300470c329dec354fc3ef4117bf89731afec3682d0a8e5a02268d46bf9c5cc1537030e837fe0875cb9cd39514b3485689da152e08a4d39dc0dcba5b97b8f3ad148d311436b9810c34f0d11fc7d3a259340be6bc17ae18edf375a82f0867b436e496fc9e30c7d330d8335ee90a9298fb569b9f8b7d2078b5900f7ca357acfb"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x7, 0x22181) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000140)={0x80, 0x800, 0x2, 0x9, 0x8}) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 00:56:17 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100030019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:17 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3100, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 721.683559] EXT4-fs (loop1): Invalid log block size: 64 [ 721.691125] EXT4-fs (loop4): Invalid log block size: 64 [ 721.696752] EXT4-fs (loop0): Invalid log block size: 64 00:56:17 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100740019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000004c00000000aabc009500000000000000000000004ef7fee6189031e29a0723e0211bf69c5309"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f0000000100)="3b1163cd78b89e1ba101567c26bc1d84b555c4e4177183ae7cc3338dafb94dd21524046028d003551e857a42f15959d4e01f5a925341fae93bf38908a5c11931b8d250fa6f686524219648c1415029ab04cce210cb1e", 0x0}, 0xfffffffffffffe86) r1 = inotify_init1(0x80000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x12) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x3) personality(0x400000b) r3 = dup3(r0, r1, 0x80000) bind$rose(r3, &(0x7f0000000240)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @null}, 0x1c) inotify_init1(0x80000) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000002c0)={0xfffffffffffff721}, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)={r3}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000001c0)={0x0, @initdev}, &(0x7f0000000200)=0xc) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) 00:56:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) getresuid(&(0x7f00000001c0), &(0x7f0000000340)=0x0, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x1, &(0x7f0000000180)=[{&(0x7f0000000440)="bcd0f4f437faeb100a124200a87d5b0062fa2b7e564c96f7a7181346cd974f5d2d5e1f6cf8343b042bb498b1e0c4d294459a4e74bb1f9e5dda183b91d43d1f8d547a7db8ea67dca6844344c07b59a2ae0237853f24da44b5a6781dcd0282fdab682edfc94e4bbf1d93f78cf4d52e11ef8d6fb3fee92557bfffc9f2bbdb08b38de692381d8f43524641140e876ed15c66c5a64722a0e6cba37ab3e44b4830ba36675dec6af0e3800fe62c3ca424330b1394d8e3a0c1d8e54bf160a56d987f5001643fb4", 0xc3, 0x2}], 0x3fd, &(0x7f0000000540)={[{@max_batch_time={'max_batch_time', 0x3d, 0x100}}, {@discard='discard'}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x8000}}, {@nodelalloc='nodelalloc'}, {@nouser_xattr='nouser_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x7}}, {@pcr={'pcr'}}, {@uid_lt={'uid<', r4}}, {@context={'context', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@audit='audit'}]}) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, &(0x7f00000000c0)) 00:56:18 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100040019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:18 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800003000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:18 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001007a0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80c0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) r2 = socket$kcm(0xa, 0x7, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x7, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 00:56:18 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3200, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 721.970559] EXT4-fs (loop0): Invalid log block size: 64 00:56:18 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100050019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) listen(r1, 0xfffffffffffffffc) close(r0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f00000002c0)={0x53, 0xffffffffffffffff, 0x1000, 0x8, @buffer={0x0, 0x56, &(0x7f0000000140)=""/86}, &(0x7f00000004c0)="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", &(0x7f0000000240)=""/67, 0x101, 0x10000, 0x2, &(0x7f00000001c0)}) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 722.086844] EXT4-fs (loop4): Invalid log block size: 64 00:56:18 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="801004000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 722.144242] EXT4-fs (loop1): Invalid log block size: 64 00:56:18 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100fc0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000100)="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") 00:56:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x3, 0x5, 0x800, 0xffffffffffff732f}, {0x3, 0x10000, 0x9, 0x2}]}, 0x10) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x1000000000000, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 722.295428] EXT4-fs (loop0): Invalid log block size: 64 [ 722.301762] EXT4-fs (loop4): Invalid log block size: 64 00:56:18 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r0 = socket$kcm(0xa, 0x4000007, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000001140)={0x41}, 0x10) bind$tipc(r2, 0x0, 0xfffffffffffffe18) sendmsg$tipc(r1, &(0x7f00000024c0)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={r0}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x482000, 0x0) fcntl$getown(r0, 0x9) write$P9_RREMOVE(r3, &(0x7f0000000580)={0x7, 0x7b, 0x1}, 0x7) lsetxattr$security_selinux(&(0x7f00000005c0)='./file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:agp_device_t:s0\x00', 0x22, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000680)=0x4) rt_sigprocmask(0x3, &(0x7f0000000500)={0x8}, &(0x7f0000000540), 0x8) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000100)={"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"}) 00:56:18 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3300, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:18 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010fff0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:18 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100060019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:18 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800005000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000070000004c000000000000009500a23200000000b1b570db18bd35bff0c4aa86836953f827ebeff488d87dc7fa011cc463bf3d7b70605140e0fb21fa80c4d37b6ccd85d0d5e2bfa700dc916f5c621b9697498a6d4ead284b5fc41b742165e99eb4e3f7fe999b7300636d89b1f9a9385a5bff060b32230d8840045e9128ddfbaa992838367ab4a83fe0879b3b"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) bind$can_raw(r2, &(0x7f00000001c0), 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000140)=0x20, 0x4) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x400, 0x0) ioctl$VT_DISALLOCATE(r4, 0x5608) ioctl$KVM_NMI(r4, 0xae9a) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) init_module(&(0x7f00000000c0)='nr0\x00', 0x4, &(0x7f0000000100)='nr0\x00') ioctl$SNDRV_TIMER_IOCTL_STOP(r4, 0x54a1) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0x1) [ 722.485146] EXT4-fs (loop1): Invalid log block size: 64 [ 722.511834] EXT4-fs (loop0): Invalid log block size: 64 00:56:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000070000004c0000da000017009500000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x3, 0x2) recvfrom$netrom(r1, &(0x7f00000002c0)=""/81, 0x51, 0x12000, 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000380)) fsync(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000200)={0x92, "be4679272e1d13ced7249fd2e0b339c239955d68de3cbc2f186c4418b73cb589", 0x2, 0x6, 0x1000ffff, 0x7, 0x12, 0x0, 0x40000200, 0x100000000}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$ax25(r4, &(0x7f00000003c0)=""/90, 0x5a, 0x2, &(0x7f0000000440)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000100), &(0x7f0000000080)=0x60) [ 722.618069] EXT4-fs (loop4): Invalid log block size: 64 00:56:18 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000002d000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:18 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100070019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800006000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3400, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x2c3) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0xf5, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 722.800879] EXT4-fs (loop1): Invalid log block size: 64 [ 722.812611] EXT4-fs (loop0): Invalid log block size: 64 [ 722.828987] EXT4-fs (loop4): Invalid log block size: 64 00:56:19 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800007000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000003b000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100080019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 723.000448] EXT4-fs (loop4): Invalid log block size: 64 00:56:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="e18baac31377a90000004c000000000000000000000000001fde613afe60d4a6350fc8af6e28aa7045ca4e31775787ce8eab47a7428ba6c6776d330812ee1a1a4d59f1b36d625b9164b67a23fe0000005931669c0ea3f7033f53ac1d9beae4316c2e6d921db8039e4b1a"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x40000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0xffffff7f00000000, 0x7, 0x0, &(0x7f00000000c0)="3b11633f78b89eac0e4d3b5dd537", 0x0}, 0x2f1) r2 = socket$kcm(0xa, 0x100000002, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffff, 0x40180) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000009c0)=@nat={'nat\x00', 0x19, 0x6, 0x7b8, [0x20000200, 0x0, 0x0, 0x200003a8, 0x20000680], 0x0, &(0x7f0000000040), &(0x7f0000000200)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{{{0x11, 0x29, 0x9200, 'veth1_to_bridge\x00', 'ip6erspan0\x00', 'ip6gretap0\x00', 'yam0\x00', @random="afe9f2150c22", [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @random="a74bd5a309e6", [0xff, 0xff, 0xff, 0xff, 0xff], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x2, 0x2}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0x15, 0x4c, 0x19, 'syz_tun\x00', 'tunl0\x00', 'hsr0\x00', 'lapb0\x00', @broadcast, [0xff, 0x0, 0xff, 0xff, 0xff], @dev={[], 0x1a}, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x9, 0x38, 0x8863, '\x00', 'ip6gretap0\x00', 'teql0\x00', 'tunl0\x00', @dev={[], 0x26}, [0xff, 0xff, 0xff, 0x0, 0xff], @remote, [0xff, 0xff, 0xa4633e90e9cccc77, 0x0, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local}}}}, {{{0x0, 0x40, 0xb3f0, 'netdevsim0\x00', 'team_slave_1\x00', 'rose0\x00', 'lo\x00', @random="b9a53c563a40", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff], 0x140, 0x1c8, 0x200, [@arp={'arp\x00', 0x38, {{0x30c, 0x88fd, 0x1, @rand_addr=0xffffffffffff8001, 0x0, @multicast1, 0xff, @dev={[], 0x2a}, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0x0, 0xff], 0x2, 0x46}}}, @rateest={'rateest\x00', 0x48, {{'bpq0\x00', 'ip6gretap0\x00', 0x0, 0x3, 0x100, 0x7b8, 0x7, 0x10001, 0x1, 0x1}}}]}, [@common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x40, 'syz0\x00', 0x8}}}]}, @snat={'snat\x00', 0x10, {{@remote}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x2, [{{{0xb, 0x42, 0xd, 'team0\x00', 'ipddp0\x00', 'lo\x00', 'ip_vti0\x00', @random="730a206ccc26", [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @random="5bdbc7e58edb", [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x1d8, 0x210}, [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xffffffffffffffff}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x5, 'system_u:object_r:tape_device_t:s0\x00'}}}]}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}}, {{{0x5, 0x8, 0x806, 'bond_slave_0\x00', 'vxcan1\x00', 'veth1\x00', 'sit0\x00', @dev={[], 0x29}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="9e41639e0295", [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xa8, 0xa8, 0xf8, [@mac={'mac\x00', 0x10, {{@dev={[], 0x13}}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x3}}}}]}]}, 0x830) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000080)={r2}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x200000000000) 00:56:19 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3500, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800009000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 723.124290] EXT4-fs (loop1): Invalid log block size: 64 [ 723.140028] EXT4-fs (loop0): Invalid log block size: 64 00:56:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x53) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f0000000240)=""/57) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x84381, 0x0) ioctl$BINDER_THREAD_EXIT(r4, 0x40046208, 0x0) futex(&(0x7f00000000c0)=0x2, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)=0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000180)) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x80000, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:19 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100090019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x7, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x163500, 0x0) write$P9_RWRITE(r2, &(0x7f0000000100)={0xb, 0x77, 0x2, 0x9}, 0xb) 00:56:19 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000003f000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 723.295889] EXT4-fs (loop4): Invalid log block size: 64 00:56:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="851d0000072c1531a2000000000000009504000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) syncfs(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 723.346054] EXT4-fs (loop0): Invalid log block size: 64 00:56:19 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000a000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0x1000000000000000, r3, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x36a) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:19 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100020019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000a0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 723.462678] EXT4-fs (loop4): Invalid log block size: 64 00:56:19 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100030019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3600, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="8500020057070000004c0000000000000095000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:19 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000b000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1, 0x0) write$P9_RRENAMEAT(r4, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$KVM_SET_TSC_KHZ(r5, 0xaea2, 0x2) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:19 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000b0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 723.648048] EXT4-fs (loop1): Invalid log block size: 64 00:56:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="85000000070000004c000200000000009500000000000000f1067e6009af7ef82682679a3bc2070439d967445802fbb639177a9d63d420ec56dcc8fa47436fed5a9fe18c6a323260be842c63763724f183442950ed69ae66b7f05efa23191f7edf44989213536ece1a42104c15b9220289052943243daf01f243796d19f6840bfaa86bdab7bbdcdd7c2a029668abc6e7d21b3ed74fcac7e1182706000000000000135a9ae3d002511173eda9c48bd90041fc3c5cae4f1cf5b9c403848d92ee171b263e6b3f6027a033f7ad0b4e0f1068e48194761ca8edf7d2f5ade0036ec3e5"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x1a6, 0xfffffffffffffe3d, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0, 0x800000000000000}, 0xc0) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x48001, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x80000000}, &(0x7f0000000280)=0x8) ioctl$TIOCSBRK(r2, 0x5427) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000100)) accept4(r1, &(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000003c0)=0x80, 0x80800) 00:56:19 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100040019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 723.718863] EXT4-fs (loop0): Invalid log block size: 64 [ 723.725484] EXT4-fs (loop4): Invalid log block size: 64 00:56:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0xa, 0x803, 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f00000002c0)) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x100, r4, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9f6c}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffff8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x306a}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x100}}, 0x880) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:20 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100230019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000070000004c000000000000000000000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x28, 0x0, &(0x7f0000000080)="3b1163cd78b89e1ba101df097f00000000000000461d202290b03598b09a8d4b71b7162d0b6b8001", 0x0}, 0x28) socket$l2tp(0x18, 0x1, 0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 00:56:20 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="801a0f000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:20 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100050019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 723.946245] EXT4-fs (loop0): Invalid log block size: 64 00:56:20 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3700, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) finit_module(r0, &(0x7f0000000080)='!\x00', 0x2) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={r1}) 00:56:20 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001002d0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 723.998042] EXT4-fs (loop4): Invalid log block size: 64 00:56:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f00000000c0)=0x7, 0x42) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:20 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800410000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 724.084103] EXT4-fs (loop1): Invalid log block size: 64 00:56:20 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100060019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x4, 0x20a1, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000000100)='G\xffL\x00', 0x101, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x10}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:20 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100480019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 724.209870] EXT4-fs (loop4): Invalid log block size: 64 00:56:20 executing program 2: socketpair$unix(0x1, 0x8000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) setsockopt$ax25_int(r1, 0x101, 0x1, &(0x7f00000000c0)=0xffffffff, 0x4) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000000901000000000200000000009509000000000000a7108037de2a5778715b9ba474328e5f4ba603e7554e017eccb05053824e3461fc27d1b13df5fc407df9d52e67184f0eef45bcd112261acadc7485face61ad63624db3c98a13a1f033c6ffc37709fbc8121c8d8bb56bc3507fb5f03744d039d3852e46eaa7a27df37fe867e3004de7f24b3a0215d1510fa74fd0a2acd2d17e6b7244a07d6d3a042c31373ca436eb58c434ace3589a80184180764f0f96f4936ca9"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000100)={0x1, "d8b524b2134871b8730b792c2b3b7df4c95ec9e46065bd1f7c106ebeb93def19", 0x1, 0x400, 0x8000, 0x10001, 0x1d, 0x0, 0x1ff, 0x8}) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000180)) r2 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$FICLONE(r1, 0x40049409, r2) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$CAPI_INSTALLED(r1, 0x80024322) 00:56:20 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="802010000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:20 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001004c0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 724.323418] EXT4-fs (loop1): Invalid log block size: 64 00:56:20 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3800, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x100000000) 00:56:20 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100070019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0xd, 0x803, 0xfffffffffffffffc) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 724.458022] EXT4-fs (loop4): Invalid log block size: 64 00:56:20 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100600019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:20 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800f1a000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:20 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100680019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={r1}) [ 724.600239] EXT4-fs (loop1): Invalid log block size: 64 00:56:20 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3900, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r2, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8d}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0xdf3171e989d14e96}, 0x850) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 724.685193] EXT4-fs (loop4): Invalid log block size: 64 00:56:21 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100080019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001006c0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80001f000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000072900000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r0 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000180)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 724.836186] EXT4-fs (loop4): Invalid log block size: 64 [ 724.853555] EXT4-fs (loop1): Invalid log block size: 64 00:56:21 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000100)={0x1, [0x0]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="09000000070000004c000000000000009500000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 00:56:21 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800020000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000400)=0x59a6, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xfffffffffffffffe, 0x480) write$capi20_data(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="100054f986800200ffffff7f00000000c38f3702d57af8ead8010fa5514561bb686e2b2b8a18e7b3119601b45e189f7096fa9b2f9f37e83367248ea79c01000000ee303db9462f0944aa66e448022c7f670149987e0eb8b5f3a159286e02af0b44c02145003699400bfad559e3fd81f5a030961378bc4dabda7b2e24ce3c200048ffdfeb13f1cffbd5b7291c22881da61f3d48d1d9ee00f17e7fa79d024eec9d49000000000000000000001bf63cbfe9475fd7b07280ca0ea0f1c4a85fc2f027801c1618"], 0xaf) 00:56:21 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100090019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 724.990852] EXT4-fs (loop0): Invalid log block size: 64 00:56:21 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3a00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100740019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, r0, 0x6, 0x200000000000002}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5, 0x2000) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000100)={0x7, 0xf8000000, 0x80000000}) 00:56:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 725.100989] EXT4-fs (loop4): Invalid log block size: 64 [ 725.195332] EXT4-fs (loop1): Invalid log block size: 64 00:56:21 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000a0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001007a0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="801020000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 5: listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/93, 0x5d) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000070000004c0000000000000095000000000000003cc2e7e559f35d7d06910f40f21210a7115989ba94b9e0b6f5fab569fe5ca5ae50699430e87b162f7a030c05b8f3ffc6e745c7e522d682ceb8527490b2f95a251e40636c0f83af809df0bc43906c7662d553cf600058f5535dc20d056ea6018b72dacfefd178bbbdf35acf1bdb65103ec5b6ae9dfd4d82352d52e190bd3264c3e735859da950e55ed5a04cc4884a0419e3573eba245e6cee09245e584ea377e8c80cbe4110b5ad4d905586a88544131d00"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) finit_module(r1, &(0x7f0000000080)='nr0\x00', 0x2) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:21 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800023000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 725.319848] EXT4-fs (loop1): Invalid log block size: 64 [ 725.319855] EXT4-fs (loop4): Invalid log block size: 64 00:56:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xffffffff, 0x800) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000100)={0xb3, 0x1}) sendmmsg(r1, &(0x7f0000006980)=[{{&(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @rand_addr=0x1}, 0x1, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000001200)=[{&(0x7f00000001c0)="118eb3675cd12e57a0d157258a32473060dccbadf5d5536e8d49e6afe3262a32494ced4933d5b6e53a0405", 0x2b}, {&(0x7f0000000200)="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", 0x1000}], 0x2, &(0x7f0000001240)=[{0x60, 0xff, 0x1fcb87d8, "719d1ccb6a53ac0c47419f75852551392941b3b96373cacc75651f4485d12d4211b38d2e4a457698381cc5e81bf347250ac517a38b8786b4ce35536ad3ead2534534e745916d9946dfa9f494328f"}, {0xf8, 0x105, 0x1, "69aaa843992693de6486f8973ecddb5fb23d1628e22421b643e076f6b29c6514fbd0fc24506f493a73d0c7d17b482faae30d7a8d33770398ec49514fff0ddbf69142001821b9066b6f912277ccad2cceab2e568f09a7a3c237a1d55e681465e73f84fc34914717d349eb3234d212f860ab5b24c2eeb39f659d34ab47105efa91469e3224d5d35f03ab75dd0dd4be6a113dd5753b437daa2e7486b92654e0ea1d28be6c1c2ed05417000b510da7da75b1a0ca9fd053067fe934410050c4716196ff0d53fcbe154598b335d9fc209f1677fb255800cab50b3a7c3020a868a7c63a2b5fbf95a4"}, {0x28, 0x109, 0x7f, "67871c170b8f342968b05bc3628a5ce73b58c9"}, {0xc0, 0x0, 0x4, "13a2d619651d8f5dfc7832bd1043dde8ba745471b1c3b243e6f6af5f14536e569b9a28c949e0d2d2316babafcf20a5e24e86a2967bfde3986328e5460180b707e0d21009fd068cd17db8e43d3bdecba257b8fbc904051946be7207a34a730daf5f75c9a1e1db9b4ec65534c94c84ea766e849c152c368b0a2706e76a32355f23c3c494f256c521ebec93bdc1f98b4915d4fedf5bc00980d9d1a80e43a70bfe3238c96f69cf053a2d92d080"}], 0x240}, 0x5}, {{&(0x7f0000001480)=@isdn={0x22, 0x1, 0x1, 0xfffffffffffffeff, 0x1}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001500)="1a4ce7926267a535521238619a0cde083eff390132fc3c4cb665d4eb11d0424c3427f4d79955a3c9b0d9a571155a00d246331bae706ed19e86b1ddefc96a310da6098c9d75df183c38aaa2618b3f89e64b3e8d235f53ac713799de", 0x5b}], 0x1, &(0x7f00000015c0)=[{0x30, 0x111, 0x5, "b3b4bda484b1e09714b1127c95664b8b0f2f730dedd19ae42e74bbec"}, {0x90, 0x109, 0xb9a3, "aca6010af512f2e6293afc02537e9afd0f72c35a46c6c5314be5883a26fb9bc7cc1a20529216a35fae8ea2134f38b932433b1a5406940a787f27575b25df39c63875e3802d35eac9b1249c094ae4a11020641a774e6c9e614c5100dbbbb36f5bced0381bfe348c2cabbfe88fe6915066061f83aa5ebbf2a9a5cf"}, {0x30, 0x0, 0xd76, "719590e3900e92972f92e0231f5abba969e536280212dc9359dc01"}, {0x38, 0x109, 0x5, "5a499b00220ba57d456f7b249a44c722877da00b0ac7a8a3157105703c0360ae9b076faa8e"}, {0x110, 0x1, 0x7f, "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"}, {0xc8, 0x10f, 0x6, "18519bd769d1dac71cce4a1aa19d54ce49a855b214aa8aaae01b4cacf54daca148816e770352824350ccace7872950ac4f6777ff9c8e793d7f6721c8ea8dadd6c1bac7c7b441b44bb31c3121d920b0ff2ffa764940435b55a9010214810acd5326af060f741c43fa06ff88233e7f2d2d256e8be3aa9ac7b6f9de1e176fdb6baa6a9b23f13c17643e0c73ea224792662183da20aadf60921f384dcc3040cf0373f28fe6ebd48a19a6d9e61608b44b0aeba41eeaada7"}, {0x38, 0x3a, 0xf6, "e75f7db9e6c7d6170b6ad682f34ac491de903bfa62ecfbf512a4b436bcc01e02ee8c0bce9089e57a"}], 0x338}, 0x80000000}, {{&(0x7f0000001900)=@l2={0x1f, 0x2, {0x8, 0x0, 0x3f, 0x8000, 0x623, 0xffffffff}, 0x7f, 0x8}, 0x80, &(0x7f0000001c00)=[{0x0}, {&(0x7f0000001980)="0429b74dcf01f22ae6b8fd93114719a5cbcd6cb7f14fd2f3c2c06ce73b9fee27d987d7cb569d7301354c6c33cd904bb2538189a781cfd003b1185d472e790d1ca183b01ba574e2e1f0ff2ca8b3c8a4a575e0e0a8e74d59b58be9d16fba878ff04edc7e6d37223dd2c5c117cac7e241746eb8d552f450e5102e6efeb05177640f706d37c24c81791e14b578f3ff5b832b5d624067c225842ef8ce7ced483d76fc1b2888ea8c67768e56c7aaaef3ead746", 0xb0}, {&(0x7f0000001a40)="6bdaa20a446bc2a96a429c9c0e9c484abc6e16915b56c3", 0x17}, {&(0x7f0000001a80)="a8c1b8403f5dd59753e1794c9a504f09458e2f3d91178de1f5ae429282a745fb0a5b74e4945a87b56d05a2d8633797f3e460d1fc4e7c102da5", 0x39}, {&(0x7f0000001ac0)="f18825d3079f5e86447ca9f617fffb67b4f64c8a1cba9e9eaea6270fe3a9ddfe7c67c36ab005e8e2539785751e538c52d024d605a75867819d9b2b44d59d19ac07cb72f2b824ee37ee2fa66852162a625f762ffb360cf47122c768d137faa81c02e86dfd33c50e576fa469fae4f9ff8c8d88cb0b7b2df4919fdaae72a54f150ba5b83ff3adcc0e107281b9cc1ad59fce1bc5ec104355892be5857fe7f052aa9c84b2278810f36fdb3a40f7c5f712e0297ab8e7c65728e3b998d25efd40c38d1e8c6c89cbd4bbd55c68798b", 0xcb}, {&(0x7f0000001bc0)}], 0x6, &(0x7f0000001c80)=[{0x98, 0xff, 0xfffffffffffffff8, "983647f77c09817b1ec65f7b9ade1e96a20f3b8e0dd12267deba174ed279ffe433145e9a83eed97376b18438d04ca7219dd7c019afb8810fc144152001a57f81af023d274527f75d8be5cbe9d17225a88a46527fb07d09faf12f64d7c5ff0927ff5f1566240dab23962c7b0fa9e294f59d74a0188a7e682818ee3cfea75b7dfde260f28876"}], 0x98}, 0x1}, {{&(0x7f0000001d40)=@ipx={0x4, 0xe0, 0xc28, "066de52e4cf9", 0x889a}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001dc0)="012e68ede6b901c96e91c18e272eaefbc59efac379b5b4e9cb690b8e6ccc40a5de936df36cae1800424b59a7771903cad8a2414580c907cc969c8eeac7aee351f2fc1d3cbe0030e42c42932bc50d05909e396431afec457facfddfbe0a36a5d0375414249035f2069da3a6b0ece2106d755d4cbe2f78e418d017f626f1f0dcbd6ba6dc7fa0361ffd76bbc06ef34e62a8fee55a0ef9c17070c24e1e19ad73e31fcb1c0052476dd457", 0xa8}, {&(0x7f0000001e80)="72acdf7fb5b82a318b4d8a0bf2ed8e4cb71945cba2e28a37f6084a84dea771123ca9b5ddf35fe6269a731f2adcef6d94983216a657e5b1d9ad7ca531b37a866906ea9c61822939cf4c54d412d43df12db4b01a5afa38ff71cfc6feb5beb01e11468a311b5c5409fadbe09eddef015dc067f77a44d85e241529beafc2a95bee317460a4c7e9c2e07bdbf09f742658b1f0c3a15b120356652a0d51fbf6fc5e36773d5c6d", 0xa3}, {&(0x7f0000001f40)="97b45c2f6bcd3ef59fc34df7dfe2a55fb9fe5041f242ceaa92825ea6fb89506cbb063cada02962e1d8e49d76e4f5f196ef16338586a0c8d268ea542332b469dcf713664a75f2f459df344cfa65d8e5933b94ecd04d100b0f1997303a", 0x5c}, {&(0x7f0000001fc0)="b70263f7cf50ef5076fb4f1e0d8bfe1657c866c0991fac73d1a8a69b899344afd5f7e8d17af724f85459f54a0df55dff9037a63f4a2ca1399e3383b499d8962807e8ef00f3a49c8e3f5f5153d75cc20a0c708c4ffcd2de0dc66d560479af2481f99714d7f3d3a9d854", 0x69}, {&(0x7f0000002040)="ef6dc510fac9a912655e070607f099bf0e52f741bbbe169da0d38a9a6c39c8ea", 0x20}, {&(0x7f0000002080)="83524bcb9fe9dcfa13bc87edecca0f41414f4f25816aa82a7872797cd2ba9f150027c5859a1631353ccfb62deb7ba5daa844597d7706f6dc0e38b620ee2be7a167e3daaf72ebc5a06bae3b7f5bb779aecd93d83496fd8c5336656153b1030783a766f934d2667a591e37ed0afa5900f6761ff76c43d915ccbd09eed8a166e020e9bdcb26f42dc2578cf41cac3b011ef87373a48695387d377c8ac7cf978b6650b056b17689089af49ab315c8e9996f9d5be4ea45a001bb9d6388bd4d30287cf76144073a366ec7fcd17ee2d2fd3257", 0xcf}, {&(0x7f0000002180)="3efcdad908c4cc9c1225704a4451060c308d1c2278b25149661943d6cd6025f720631d32903bf6739c88ccd5b5aadcf3946b9342", 0x34}], 0x7, &(0x7f0000002240)=[{0xd0, 0x6, 0x2, "22972074fcb03805e93b9d06240a7940c11eeb7f1f66da9683bf0704d6fb6a0921a06539f32037998f1d2565c07e38cd59833c27c89f37fc692a8193f2d163485fb6a0125febf81d9ffe21b6ca7c0532bee58692f489b16ddc9eaf1e0200e03f1a56643d34b84ebdfa3a01da3ca555301e48ae361be3764f8b4c7e9df0308da4c408d39456253865d8ba2220f70f8f6389d70b1cd84509e5741bf3c940d02da76a17c0fefb8f4e79e861c24e7155319778d716ed12c7ac7d1fed8880"}, {0x70, 0x109, 0x4, "1872cdcd01df89306e69429bfe95f9867c957442adaf038ef426fef5020814477006ab3fb1273933ccf05c9e60ae49d3c9da2af75022a46bddb1c5e2955e37df60c665722918104997936a497194f2530a76a65beeb44c2aa503115499"}, {0xc0, 0x114, 0x7, "74c9e6f534b23306c440f92827334e2c775d023af7e4f6230fb1630b71c5545586627623ae13ffa07c0d72a87f0a8bc831f70bcc54583f4f2ebc6cfb2ae9af594f340227a5c4b46c9573708704ebe6b6a7b5e4e9afad964ea4122a1c2c707a78663e5714685437f39834c2d374e433719bcfc4a367981fd598700faa6b38261ffa4de73627db3c7e3b5719c63c84e3bbc344e7752904bcb02bb9d0d09b55c15469a0c2a37a8a9c2cccdeea0c8f7908"}, {0x58, 0x18f, 0x2, "d93915543e4ad8747e0ba209e2241c73284a96d78fb1dba23f6269e73652977728799e9ccd22b8ff18032634b0dea937705c7022c4ccd166234b9db71fa689cbcc38f99d"}, {0x90, 0x29, 0x5, "4021d1757b7cd5eedd1698d0659600376dc4b0ff24e1223af5ce637739f597b784e1b179dbe30d5c32454533749d2d467792baa792ec3b714c8d7343be6e9497037feaf1b32f4a9f0c48462aee60b6aa0a1722104c7726eeb24232e9bd174449268556f20d6a37a29f741ef44952842ce0727306ea3c17d4f762"}, {0x20, 0x101, 0x9, "e84521fa2d26507e3f"}], 0x308}, 0x3}, {{&(0x7f0000002580)=@tipc=@name={0x1e, 0x2, 0x1, {{0x43, 0x3}, 0x1}}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002600)="e5499c29fa0d10076be5d54d0f583be87b7837a379e681e6b4f0357c0631575b0d7d3576bbec09262ab2b92c743093b4718500a852844b31cbb70aa0613fa67eabaa17fa8cde8b0667cffb1cd1194c", 0x4f}, {&(0x7f0000002680)="7acfc7edc430a737a78502fb782580d2f8afae49c64b7c7746193960da626515d2a48fbfd3ffd863c2af18565d1cf70bc989247aa0c67b", 0x37}, {&(0x7f00000026c0)="c7a7a4ecd3806ff4bc923f82a0268503e7664f4e342499667d1640d4bf7c4cee2f5aded23d66", 0x26}, {&(0x7f0000002700)="7960e5963956f96f7a4fbaecd9ac7870e05a50b374bf7157c52caceafe3c37e148e4294fa29c4c6f351d4c663662377a2422d3ea05ebd5ed237ba9c3a72d2c72dd5248c529c05604f62b5c90d5603a9d9cae95bc9f76f56545c58b3418bb37f8bfb1789f8bba6dbd1f03a620a19831f0611ca9c2f16f70d320f793dff039f9bba361322ae662e4e644002e0932d969481527c5bb67e4d77e4c4b35f7b4ae147b31bf99d098060e4dd4", 0xa9}, {&(0x7f00000027c0)="c2708f2406389ca42642498ee4209498a81d8f863dfaa1eebbd9af0070b272da8d8e71415ce28bfff167e9e3c9350654686739abe847712c9f0277dde74e2db79fb96991ee44742112e2117462a77120a99f163b6cf3576c8fe2e3ee67c8a3833d8a30aae46f2e480e724b9026fe316c65b58f85cc13a096e7e95d9e9d3dbe66929028735394719c93610be006389c3657ea928219306b1914f44b8b982e93ccd4f3a453608f957baee6d79a4e1cb1b383e3cb723f3c23b4b0e8c879922538fe3a03f74fcdb614c5bd3d838edf9c8aaf08e7ba2b1e876d27", 0xd8}], 0x5, &(0x7f0000002940)=[{0xf0, 0x117, 0x178, "d82ef417645b17dd911e03767d8f48189867c9959c317f93dea9228c382b7fa5e5156788bc9b220f66ea76a6eded8cdaa2487ae6402e11ce1fd87c8f642554a7e74ee0942424f7da35e1f58c8dad430a91c8288a47e1b16b62f31836efae4128bbd4902a7b3764316f8157561eecabc897e40dec87274418584e5f01b770ceb2a91c44c9c92db956e119f07ee447920abd8ba2ee42f53c35eed90a25928f58700db1054289103fd6864cbbb2d535982296497230556cc1d0bd67a8c3edf0e7660323a66a6a6bf91a5c9c1db34625cfd1a85552ea08098b5ffb53accd"}], 0xf0}, 0x2}, {{0x0, 0x0, &(0x7f0000003b80)=[{&(0x7f0000002a40)="363a72e54033f606b6620aacb9ac2c02", 0x10}, {&(0x7f0000002a80)="61de4ef1727312d65846e023bb5f3892200eb49e811e6433dd241f74f53177182fbab20b392ebe0efdad8e21d0493acbd768d404d8b63912a3356a2edd3cba40", 0x40}, {&(0x7f0000002ac0)="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", 0x1000}, {&(0x7f0000003ac0)="7fb0820320be0e4eac374e47622f99e10a98ca3055a3fd518044f43102e2b962a615d8f60e07dd88a86144d1e8a6af4e8a82462109ae4d8da69ff4d1b7ac42020946c82b8a61dc376dfec60e5f0f9a20771fe8e2e4ac503a854172990605ca0fa997451110b438bebc08ed3c2daa5e610e234ff98d9ce0a176ece2f48d5e0ed24de2fd4703ba849cfe3c7f456252f2fb5bce2d6b4076ba2a0b3d2ef83efff902a425afaefe", 0xa5}], 0x4}, 0x9}, {{&(0x7f0000003bc0)=@nfc_llcp={0x27, 0x1, 0x1, 0x2, 0x5, 0x3, "58ce04eabe938da12102d79189d04a3ae035f9ac81ffd14e6c95863624195d58dcc122642af99885a0e3c9be930f42826bcdc15eaafe21eccff0938990b520", 0x16}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000003c40)="9e532cc352974ec7baa8faaa86d2b36580edc31b989a0b5e2f82dec4e5ff6dc77cd45fd0c0170aca9db4099a82e15ff45fbd69c98235950336c3732dfc8f2bad5d4d71d12e94002135566833a8cb209cdf9e0a1bfc4a037d551319bd739b346df7c6d1fbac4a09c38441ee189360404883", 0x71}, {&(0x7f0000003cc0)="45a46353f849791bbb0a680cecbcf2eab3adbbff878e36f82754da1b96fa2f9a54a981838a4654b27a32bb1b2ff114f905c460fc37e2c0e4360cde6ccea3fd0d2a8ddbf0ed8d5ef2cd4bf674b2cde0d6d986fcd7ec8a354f772053421263200d16aa32425636cd687f3560b1adec32da3676edda41398400b99d29fd7a9a9bbb2c39", 0x82}, {&(0x7f0000003d80)="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", 0xfe}, {&(0x7f0000003e80)="ff06dead82921f7a0293eb947aa8438b7218df7b0d82314eec717f8366040b157b4ba639ed0c7bed51dede67de3109a90cfb8c2defa87b233ff84bb8bfb16e02c4fc0595254a01f7ff567e1c6aa708ffb2c36153211e8433d838aa7b0545c6", 0x5f}, {&(0x7f0000003f00)="74168eed8d27cdd75767577f42fde975051763ef0bb27c7b99585d5d3fbfc00df221491fe75571e82ed85f8e6c1aa9471699916d4b3ff3a9e3e9008769c92e8cd273f2ca92b52ae94efa34f2ad883156ebfca9e1c9603738ec36d8055eacf15135f8f8deb9abe7a64d3ff6f3004b5e99701f0d2b45c7c7d483650ce4333d572b66a3ddf237039bbd0dd73b5f7d094181b695d32c089cb7f5f987d7337299acd6afd2982a7e51afe79f526bab1483443512bc1a50351c872d20c7856736a17e3f64d6f0bf4f1125c5f77c5a538f4164f26bfa7cff709cfb678811aa3567d6128b30edde9d95aefd756f389301ebf3037e9a2f92a0e59cb32b8f076568d1aed8f7a4a2c32cb127ae70e01bf9789e0ffbcb68b147415e360c8834889fb31ea803e04194352e5242dad010512edb8158fb98a02de0bfb270132fa8d6bf72713ee873d77ffd088cec585b8b6940a93cddbf60a920adeed41775437a129437329cbb9555591a9741ad5f84381af4b801869fa5d4d80bee7fe1c2b43c3ef70803c58198367eade3556b751cd1d40a62e6c37f9e71d2e8214cf3bc95d1cb2e5b5e2b281c8db7bf2948443eea50a8d26a675033706096c672167853e41a0e11c8f21b9323f9bb7b2895c5fb89e60bb049a3a6fdb9106a51007059714101d06b2d9be9a320aa0108e91c11eb01bb323def2fc35429082b791a527689f0e4e36a5660ebfae12c1cc2b11ae82f9ec00aafa9f443c6b872b124f47b9d982df34620058d195aa10555bdc32faf14eaef13baa85d2aa4900d313cb151913a2589cf039ddd4654012dc678e2b7b1c6914c127dc871230149c6f89e813c642502d791af06d560e33476380e3b16a1eeccaad291d7351b12c0acb849254abe28f8dc96773377c29491c61ef8f244f1caf08c9ccc6322ac0c9731c7ecf92248145906d15c742b15505111649c7ad777dd0b8f06bddbe48f821319379889897f7d2a2129ad301658a169695974801dfe1ea0241002121450b4034207e7c0ef5d9a7feef2efe486fad2635cee5d89040c177e193d30e937dc6b5ab57d2d1186d307e4889365b089dc9904fca156f76b015d28424f8f7fd9a5210c9d466df8cea2154f654672e54b73822b8e63717406a06390aa4e99b046f20cc59c81542e5f2a169dfc9948217f6fb6d47debced1604f06a95e1dd0ef91e1c4ef31c0665d7f6add5698b17a4e76491aa6eb8a254fa8ead5051ed1094d15d02c4be5bd796c71222922554a85b08039fb5355e2e79b67248f394a0b71f98b735a34bea7ddaa62572072c74c0e3da20b20e4172ed079e67ba3a0c3467b9851eb75f972bf5270914cba571d243eef789f25d76d34cfda36e904b54415e1afb7b5fd75427447f361dfb35bde1b1905d795e8ea82f0ea3c2c64796b54f954d6a8069843364410a97cc1a1e94a47998e1460f9f91275a67556c4be578d5afdcd00bd4cfa9ac2136d6fbfe677375418819a6cc81bc7186e02bdc92bfb5b168f158c482c9395e063e2ce77e26461157c349aea12b6c7a46b713f4a2bd2cf398977e5d499be00f7062048e940eb8dc97331da8cc2f00bf3728045ae099e60485a6f923d018d58107fa0ed4118c94b3fd697676f7131a1a380a91b860d18360ff3e2db24c909849293392ca24a19094da94e40e07588fb3789955c28e86c8444147f61a454e6ddb6af0cde0b7d7b31724c50f9341feb3180fa69127f18652aaffc730b8a60d190b65919995ee1e04bbc4859714b47c4933a668be42cd040f7ab7f3cb2e42d1ab26fea0d8440be7f3db06d80ebf857aaa7d3bfe72059cc31ef08237d1e97731230abfe30f5d3eee0803a8b1426a126b5530e42316c8e5f0a8839672cd24f700b22aed95d5f58491aed4bfb160f5eac8881f26968eee6f6fba291ffb3110545c834f5b6f245462fb46535ea12547ed8956056ef7121a611833b1d494dd7fb98603678ec40235bfe6fe4d22ea5e2146890f0c985854050d1c217e5ef1d8a74350db2f6d1dfd4312409b27f31735291f947f45363f389334ba836da3c3b2f05cfa64961940900397e811eff938ac97b4a4070020658f7b3109b4c3bc06120258004a9abed6c8b3ba26eb0af5f7cac07deb5b47751c13d28982cecbcb6d4cdcb80066b71e5c8e2059e978c05e92247d2c8454883e8d08828e181c6b949bf6b60f2ca6afa445133dbb1e9552df89c1c436ee147ff863419f98833f662ea42ca2417692a9a02a41120ea3e26a23f3ec2bb39f3fb0ceb05c2d9c49d134221a31ca8a2e2cc929ce62990cf40433b2013130afe583ddb6a0cb6039ebc0e6202ead0a078725773c35f30071e49d7539ee3b9a0166078a57ba90a4e565a8573e8baee0ea8fe7054ab54fc23b532d8941a89079d2afdb21e67102a0003f3433cf71647eb4ff93efa73acddc91fd972aa0b16c7f2f5db9abbe2dab809d7dec9796e25c7cb09a251f0a2f399107d5cda22d327d1925622a7295508f39954d97ea3923aa17510624748b07e648841a179950bf6b442547b3df50741f0cb7222dca1844ac69bb8a5fbf890c7db05a312f3120942f48a4b234b656356d04c41dc9852a104267c15fe97a1181f93fbdad4ef3ebc5b8d11e8aba39026e7d0e160e1e9a5def122efd5ec62e61970468059024d80c20c9b74534ab68c79bc40f6c1be4866b93fab871d2e033b0b60dfa5e31ff79977298bf656cc809aa52fed9012a6823e8071322aab380f5102db02536944a68089f7199a972af1dabc9a3af31e57c4d7482b8f4d655ef26810ac5759b469292d4f4b951f80b04f2e6c9552ee4c5af6bbf7e3125f522c5486fc0535b679bcb1f81f513a305bfa6cd675e3446ad39542ca405d9c07a009187809293a17a20758af16e4cb9abd05b6ab3b3ab2af31787bb6d03bfb84e99dddd2fe077a6f4c9122702b4ec611dc29a70150877beca1f04db4742a68748ff4cf38d2ef9273bbf18bf8ce4d0b0532c976e96256482b27c691a51389270d17541d885908ed6e78ede6d2c725c3eb341d6f4bb6a19827021fbb973f2d6d8d3ebe45faddad97f2e017ec4003d6831968642d8a70255a68d8d982e1db414da35f8066833eb64fd8ce3848c17d422c6c1da744fa57c5b5c6f17c86c723a5a0bc7d64bc8dc0e62a0a336193e5eb5b368da5a3395d75c7b0f515c3cb2c171feb0d91d723138d9c9d703824ae959fb18328c0cbd1d03007548b11ff2f99b20d5fe22ecc4e182b7206f99dab295c5447fbc6045228808934293e0be6434fc65dcf1b93fb0029571903d189a32287cd982df1608358bfacb611524d160a9195f319d0b32d194af5e998f8497c1320dc46bcbe96361e2441c588e74c39941e326fc31c6879112768c6df8acda15c9c9cc8cc7b89554a24c949d45f91558f6b1d8ec17c903016001292a73c39f532c4da33b8b9b18a23a850aefad8ce78698d442a529818000546aa0321343dc8183e3c6953364e03108d6a0e98b0b9b8dd27b3a0310259808d5e6a9d460ec83ffd49d4bf19f30633f0364900dcecc97cc84d2496e353bba8df45bd546d94140c5c4255a31642da1271c9437b2caf17bb622e06d2db2f61cf1dd4ab325abdd0b77fb991cca7f60c1fa60bb26665245161837188e3946125f7bb392ce08ddea73413939a5b7d4fcbe3296cbfaa084f2b7f5f1a6bdff7801eb40955c4e16d8a0eff0e29e2d02374ca20048f2d39546b8d8b47537e784e5cc8afaf284e7bdd2beea5e9ab02fe0a80221e244d611a76100349582dd8974cb5186627492c44b820f1b4c5bab9e49f9da6383267878d7f482d87a9a6ee42a847ae80c2f598e322b6ca597138da502f84628eea689df22f49fbce6e2cc864776a8b6b8b6995577d109ea08ba54c768b6620c9cb44ff03c4482e84d63d77424c58b14b2dcde4e1f2bc04b5bdcb23a7b04cb8e9334f6a18bd466e97ed3884a34776c24095b07f9353fbe8607de071333ef9d7a5ca749a60f94b3a577ea35f3188255bc9ad66f2dd709886e5466ecdbe7039055e543000ddd6a3a173612bb286690f27eff7b7095c1a4074da14fecbee08b84bf0843a5c196d7f893e98c13742b3524119382f013433f216b7e89b9b7a3e53aff02f385c78b9e91132f4b008d1199e7c22487c6664ebffb426d125c50689ac387126d3003e970637fb455aaed3b452cabf8227501f86c8c540a885edab003f7dcca503bb20ca6fef5f77a3a89e6d97fe74b6522f7c7dfdeb576b0af494df00c0d59055b369b70f652d0ca8330df31c9736c9ded6a740fe3e6049b0712ffbfde2d5f47e7bdfbac0356e4202f57540c84cbd30dd538c4cfa0e86d52aa1d7da9579d3cd00be18430cb3c6873080a235987964043511e06fc28a38a0536379258e584bfff767cfca39154e326b05b0112ce2e4a412856d71ebb0fdb6b6cec8c8432199b83a32360c31fbd6081ad0a71e698868c4306cb7d63d3609f8298ede39c072e724ea96675885549a28707f2fdc634a6b295c18ea56611e24c58f0b8621e482a68f07266fb4167f13403d04bd86a76142c7ebb46ec8a6054525272bd2487e72cf4fb061a58b13540c9327fe3b08c9ef2df5f47f994bb914d90a7aa1b31f8fb523c2176ca68c8047438443a1414af867e71fbc9a6c8aa8c32ae8c58cd3ab9954c99d516b55ef6d85e80738f21a76a97ea5cb8c619d95851aa6a71d5224faa2573726cdd083d548c87cb39e8e19426501053d63573c28e2ad3e6bd3a70b09556145a90439d5289e4661751795afd2d7da8618e4d9598cceefd2195512b5fdc91615340e2a42b4df829e363a5a163e8a84b74938cd8531f49278b7794e0fa1f50f53dc5e9065031194b5ad585b16049489204d17c80600df6b9b08f62eef69e1c29e9c2a39ef8ef7d47f4f7815759549d4795d986441af28f093110c2b0d75d197e67c230422ed52e49e075c6ade258997abfe51e49597a1ca3ca72ea23c8eb8ba1f65526c38825cec0989134cbb519bb2fd9f297c57a641a61968494a2aee826a8dba1ffa3173c1a40885969940267559d7f1ee71f11eb4ad2e6ef5e3f35af47624a886ad2c0c84e4924a4fbcc0bbf9160d89564a4d81c09f3386a7326e19023a925af1cd0f4b8e0fb9e69fe19a27a08b2a2380ab79d366fe8f11e74690adb4acce0494c3941ac13d32d40ecb527e4a8746f2889a763cc26657c8d81234acb85e52b708501192e4ba19a8371c83a71b5a1388ed3f00288d49340811d180a55cdf8917b5e69340152d9e060da73f1c4cc566b02198aada3ef58b361e41ddb9b7e28cb48fce7173aafff9aee1b44a76fd3a5c17e9dbdb5f235cddc8953ba39e9770bc9694b83d1beb3bf3ac265e7ea0d823e37b7e3dc29aa081b19895996da0d3424105c698316e2554e7566d06d0d24fc531786f8dc3d77907ca30b168e1bf9945a8885293fc0572c041556c30ebbc49216b182720f9e5215eee0dec03db50711cd925f6fcd7cdc803247728e87c6680ea5a4ff45d58b80eb9f87f73728c337c6a297b8fd59ae6594e06c70401bd3a2c5a775b663258193568e4502733c6f5d681ae14c20c70bf053f19f557f15499aebd9bb60f4479f43f2326ed4f4326d808600317c1c3679e6eefbf4c9ec0a4577fe2f86df00f72622fe746f318c3a4093262fa75da644c895cdc2bc590357f683d6e2cc58215ff660523b673fcf0553f855116bba84fdeecf4d80a3523ac3f3828b7bed35e9bb81c868644e9da16c85f6276bf0eb56dcbba6e20d12aad0a2eb7744d9fda6a07475a5fb965f3827a7ca2693642", 0x1000}, {&(0x7f0000004f00)="7a16bc170e279a8f8e6a564444fa6ce82b9dd0ae686ff7a8bea4776887be8560a256d12ae70159a75477036fbb02a14ea31874e26c6ec153d6ffd00ea5794926d1195d163f8e18b499028d545b17ec81f44f9487bdfbabf75bb2b05002fe08933fddfdc7b3340ce7eebf0ce30b045e108d305e39c6c028c50b57d440188c831f8f0804f809c6cfea6ac764338483c23b97", 0x91}, {&(0x7f0000004fc0)="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", 0xfd}, {&(0x7f00000050c0)="787d395b1ee7318daf13595d22f11da4c504a850699ab37ba94ebf899d5f9c84b2e388866017703f8c178e8010a64e09a9fdf52c5e8ff5614636788f88e707470c1b31b658a0d19db09bc86146e55bf5757fdcabfcd17f101fbf822c540bb59018a615352365771f3e0245f3e9a3e6dbbfe625ebf20154c5c68344a8417f1510cc6438fe0b76cbf380f57a0e45e6767ecf0350a27557dd99e639746ac68a9e1eae35a597d5ac0e87699973c7026964a8ae6f87c97ebc75581edf89e22c1c82d24fba54f1348e5d075703a68124ba612f4ee0808564c9768c304896d78657157845d5d2ea3b2b0d5bdbef8bc1574a8a23ed2e478c5f3bcf98e7aa50a5", 0xfc}], 0x8, &(0x7f0000005240)=[{0x1010, 0x11, 0xb3a8, "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"}, {0x88, 0x19f, 0x8, "7a12d035a30b8ce5c6c94a0dba2000279deb1c68243c1f46e6ee1ebd3d70e93667c574c1534468726121ee7eef863f11965cd43189140d2b520ca87549eea6973ed1f5917e9fb4711f595c92d712af35932a80076e599e0ef832549f379f7a76adb952a34cff49b640785a6bf03de9bcb570584264c0"}, {0x10, 0x0, 0x7}, {0x68, 0x105, 0x4, "f2e450bcd6e7d733d972ba2f88076a714fac1be828ffad653dfd646a2f965634bb1c3a34bfd4fc78fd69cda18c6e573dff43f9be464c3263cc292d96d43f7dff5bc3581b93683793c4f30d853ae11296328aa83d36e2db3a"}, {0x108, 0x19f, 0x1f, "51ee8ebc07dfca657b6450d058abb2d47d37e4cb26741b8f901cd7b7ca41595db1e1629ee08bb38723b37d6195c539207c392ae1046cca5c7aaa9ea3e00cd1226a7cb694ba24d7d09c593b77da4ed2da3be2cb10d89407a87c934a32085e71b563fe2760cce224a41d5844be49cef8f5f4202827314ed9dbcb8047234fd02e0eb9a24f9f14d4d43201348456526ecb06082d016a78827623a64c654812ad6cba51c785b6704ac499523cf1e765c81ca7c12fa8b5867a21dcf1bb17695d6f3d701a8c9d1f653a6bd682e081c99664a19b09277a1db36d1039e67efcc439616032d019dcf2bf886605a2ad7d55e2e5c502de5b4f1d55616c87"}, {0xb0, 0x88, 0xd0, "1d52ff668a133f84c1e9987d97c23162e7d17b338e3412dbdad4fbb318090e02a72e0f396e706e92f29f9e00b43e9c082b5b6c46dfe3f09565ad0e430284b2b96b28e7d4828f36a624e20a419c300c7e6c6f6114c1e9e41ec89f97b9f9bdb48c25734c623e81f20d5c023d017c4148c4f1aada9d44a444f62fdab1f234153b071745ef8b4ac402e80d97112473772b04708d92c45b7212cae02b83f7"}, {0x78, 0x10e, 0x6, "ca3e8a373ea42b0b6ec2e7df130322d64887cf1b676d377545cf28db0925b1c1566868d0bc00bc3cbad1cd1579d12ba8bf3e95f122d9c962cd33976d0b8970a8878fb960cdb4518550441535e4a4d922dc8984b02e549ff58be6c5c06d027d55b08914e3a6"}, {0x60, 0x0, 0xfffffffffffff000, "e83cfcbf52661f233189a0e61574f1d580453ea7fe294aec498c0102f1685502d9a526b793ab86ee1fae9e5ee6158415c6ccd0b63a88dfe00d4bed83ecfdf787b08fb6f74203938abe"}, {0xc8, 0x113, 0x9, "7674526c3731a280b3998edbf35b58aad89d5c9bb25ea3e6a47c5d61c1f822a68bf513d16f6e401c0b830f4c06f462a5c81a68338eef2dbfbf95656360b4ae8aa52efd5e33c1df4459a21b9647f814719395af598e099522b4c137a73f2f8d4518ea60622b966ef65929e3017d429e8bb8a0eb0f75de0970e1ea4e042ddc4395e760eddfd18fce9d0ff082ad17f4ecd7cc0d3a6ea34dd5fb857fa83d2b5fcd70ea794bfc6024339b4c3b8fde6f10c7f37153e458"}, {0x10, 0x101, 0xc7}], 0x1478}, 0x5}, {{&(0x7f00000066c0)=@sco={0x1f, {0x1, 0xff, 0x1, 0x7, 0x6, 0x8001}}, 0x80, &(0x7f0000006940)=[{&(0x7f0000006740)="3d0400cb6d9eeb9330b768bfa14dcd7d2a9eedea7611370b72784f75dac6c5eda59a017fc9fba202148872286a76463449afc3d3fd4c61ed4b49769e10d9", 0x3e}, {&(0x7f0000006780)="4210c33c45b18e87539a3816552128ab45f35892db3c9b8787d35c04649a6e9a2f21a9274c45d377293de8f71be74e05b8a50559173a067074d1962c9bd6ce86cd8e5e7c4c8326bc1fcadd9578679d863c48b52dc57f2aac22cac55e86a0e379fe74afaa7740a724c06b57cdf40610dcb1fdbce777557f2415703845dd6634b40e89a17f85b22ee9d857b0c142304c0fa572ed5135d77997af720f2013e7cd4af47c36ec05fb11bdd4ac2ac3bca3de0c59c67d9fd6eb29311233f28d813e79fe1ff0638cd494872f5ddcaa712070a7", 0xcf}, {&(0x7f0000006880)="7d211e280077", 0x6}, {&(0x7f00000068c0)="3238a8134d030e2785c0f9730831cbb595fdf74e8d8caf76719e7ce741bb879b7257c0d3354ba12b28ff25071402dd2125fff9fd052e282647520b7e5e3e8d2218f7626d152f31f04f198bcc517fcad6ef8e2363f4e66ae8394d87f94aeb7ba92029bd68", 0x64}], 0x4}, 0x1ff}], 0x8, 0x0) 00:56:21 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000b0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 725.447286] EXT4-fs (loop0): Invalid log block size: 64 00:56:21 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3b00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100f90019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 725.524250] EXT4-fs (loop4): Invalid log block size: 64 00:56:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_KEEPCAPS(0x8, 0x1) close(r0) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) io_setup(0x2, &(0x7f0000000080)=0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2, 0x0) io_cancel(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x100, r2, &(0x7f00000000c0)="335f7130a46affcf1223750c42016f051fe875fde573ff0680405dda5ddf328d389f1de1c3b539ce72c9a1221477e806666fe739af32277c589e2bd8e433b1df4b54c8dcd34258bd8c4c2d22653c5e8ce4625c2e96ec1a920617d37487ce47a69bb7be45", 0x64, 0x6, 0x0, 0x1, r5}, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r1, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0x3) 00:56:21 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100230019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x1, &(0x7f000045c000)=@raw=[@alu={0x7, 0x1, 0x2, 0x7, 0xb, 0xfffffffffffffff5, 0xffffffffffffffff}], &(0x7f0000281ffc)='G\xffL\x00', 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:21 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100fc0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:21 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80002d000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 725.660902] EXT4-fs (loop1): Invalid log block size: 64 00:56:21 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001002d0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000070000004c0000000000000095000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000140)={r1}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x50, 0x8000) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) recvmsg(r0, &(0x7f0000001600)={&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000100)=""/58, 0x3a}, {&(0x7f0000000200)=""/200, 0xc8}, {&(0x7f0000000300)=""/235, 0xeb}, {&(0x7f0000000400)=""/113, 0x71}, {&(0x7f0000000480)=""/217, 0xd9}], 0x5, &(0x7f0000000600)=""/4096, 0x1000}, 0x2000) [ 725.782414] EXT4-fs (loop0): Invalid log block size: 64 [ 725.784111] EXT4-fs (loop4): Invalid log block size: 64 00:56:22 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/rfcomm\x00') syz_open_pts(r0, 0x10100) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000070000004c000000000000070000000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r2 = dup(r1) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0x8, 0x7ff}]}, 0xc, 0xdf0d61c4cb411a2c) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000080)=0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd7801df682bb000000000", 0x0}, 0x28) r3 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000140)) 00:56:22 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000319000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 725.968367] EXT4-fs (loop1): Invalid log block size: 64 00:56:22 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3c00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:22 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80003f000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000070000000000000100000090967c710000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x6c, 0xffffffffffffff05, &(0x7f0000000100)="2bb000000000000008000000228ee572ddd9030e8425aa3ee7fb3be350f1649d1df95577d4c37d64d6cf1711b1cd3243f43763eeeeb738eabd8085fcfdf90825e2965623e4edf8a4716e5165758f80026366f2ebb8c2ebea13e7d96678927ffb0e0b48881f48b341198cddc9", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) getsockopt$sock_buf(r1, 0x1, 0x3d, &(0x7f0000000180)=""/4096, &(0x7f0000000080)=0x1000) 00:56:22 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100100419000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:22 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100480019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x25) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000180)=0xbb2a) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="9adea957087a"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f00000000c0)={0x0, 0x0, 0x102, 0x3, {0x9, 0x3, 0x588bdfa, 0x280000000}}) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000140)={0x177, 0x1ff, 0xb6, 0x8, 0x4, 0x1c}) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 726.097586] EXT4-fs (loop4): Invalid log block size: 64 00:56:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000080)={r1}) 00:56:22 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800040000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 726.239086] EXT4-fs (loop1): Invalid log block size: 64 [ 726.246860] EXT4-fs (loop0): Invalid log block size: 64 00:56:22 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000519000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000100)="21660516b41fe1c33f6eed7ca6673525bfd4befd73e43140f87d04dfa41a6f8d2b3d5911ff43897bd268f1808b0529741e92505c7e62bca2cb", 0x39) getsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000080)={@broadcast, @multicast2}, &(0x7f00000000c0)=0x8) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:22 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001004c0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x6, 0x200) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 726.415524] EXT4-fs (loop4): Invalid log block size: 64 00:56:22 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3d00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:22 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800048000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:22 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100600019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 726.486414] EXT4-fs (loop0): Invalid log block size: 64 00:56:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r2}) 00:56:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:22 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000619000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 726.610441] EXT4-fs (loop4): Invalid log block size: 64 00:56:22 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100680019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:22 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x0, &(0x7f00000001c0)=ANY=[], &(0x7f0000000080)='G\xffL\x00', 0xca}, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x123) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3, 0x20002) getpeername$tipc(r1, &(0x7f00000001c0)=@name, &(0x7f0000000200)=0x10) r2 = socket$kcm(0xa, 0x100000002, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x10000, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000140)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) connect$inet(r3, &(0x7f0000000240)={0x2, 0x4e22, @empty}, 0x10) 00:56:22 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80004c000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0xa, 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff, 0x1}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000004c0)={0x0, 0xf4, "737e9f04b46c7d6c6567be07df7b8177504089803862922cc3a48b0223f136b53649fcb02183f7fed86336fe1e08a095c100d165f12b5f0da2f646749aa0d2f526b5af64167edfb583cdc97f3604363ee62463bdfe3f075ed0386417b6711f3c081f6554e0dbc613dccb0c57cfe6e55b1980b5144e1fda84ad86ce5e88b2d68550a34412191fa4531597796a1a77ea9443f5be3fb7287d92c1d26a3e9d0f888a1e7b4e32a6685a663cbc3f8711c25b396339f4ab29e43b3ecfcf1261d9196a5a294bb27d12c7ace6e560e2b925b4af590dd6fdc3517c5b87751754678b5a72010cb145cd02d7126e87dcaac97ce30520261b4dd5"}, &(0x7f0000000280)=0xfc) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000005c0)={r5, 0x6, 0x2, 0xc0c, 0x8, 0xf23, 0x81, 0x6, {r6, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1f}, 0xd315}}, 0xffffffff, 0x3ff, 0x2, 0x6a4, 0xffffffffffffff51}}, &(0x7f0000000300)=0xb0) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee1, &(0x7f0000000040)={0x0, 0xa9a, 0x3677, 0x0}) r7 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r10, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r10, &(0x7f0000000240)=ANY=[@ANYBLOB='j'], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x200000001, r11, 0x1, 0x8}, 0xfffffffffffffc80) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) r12 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2c0203, 0x0) truncate(&(0x7f0000000380)='./file0\x00', 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r12, 0xc0385720, &(0x7f00000000c0)={0x0, {0x0, 0x989680}, 0x1000, 0x1000}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r12, 0x84, 0x1, &(0x7f0000000100)={0x0, 0xc6, 0x1, 0x4, 0x3, 0x6}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000180)={r13, 0x80}, 0x8) 00:56:23 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3e00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000400070000004c000000000000009500000000000000b6ed97316cb25b13c4e79cc53be20bd56d939d6cfc50903aa38ef4a3980fbd76689f5b3f030c16485d441f497eba6248fec51472fb2d50db69e429fb8a72ec09f18f94dd00ecda6f55523665ce95507212e3b57bb604c5788af2117ddc6faedab35f6e84bdbf12d0d047b6"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x7, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:23 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000719000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001006c0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 726.808619] EXT4-fs (loop4): Invalid log block size: 64 00:56:23 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800060000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000919000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100740019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 726.962411] EXT4-fs (loop1): Invalid log block size: 64 00:56:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="8500000007f307dd65c38778d7138a109500000000000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xf3d, 0x1) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000100)={{0x7ff, 0x7}, {0x10001, 0x75a}, 0x1, 0x0, 0x4}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 727.074977] EXT4-fs (loop4): Invalid log block size: 64 [ 727.104083] EXT4-fs (loop0): Invalid log block size: 64 00:56:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) preadv(r1, &(0x7f00000023c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/247, 0xf7}, {&(0x7f0000000080)=""/45, 0x2d}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/159, 0x9f}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6, 0x0) 00:56:23 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800068000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 727.192271] EXT4-fs (loop1): Invalid log block size: 64 00:56:23 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000a19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 2: socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/psched\x00') write$P9_RLCREATE(r1, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x88, 0x0, 0x2}, 0x7ef}}, 0x18) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) write$P9_RFSYNC(r5, &(0x7f00000000c0)={0x7, 0x33, 0x1}, 0x7) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:23 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001007a0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x2c77, 0x20800) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000240)={0xfffffffffffffffd, 0x4, 0x5, 0x9, 0x4}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x54, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x8, @local, 0x81}, @in6={0xa, 0x4e24, 0x9, @loopback, 0x3}, @in6={0xa, 0x4e22, 0x3, @mcast1, 0x2}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000001c0)={r4, 0x7}, 0x8) [ 727.322579] EXT4-fs (loop4): Invalid log block size: 64 00:56:23 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80006c000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000b19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100fc0019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x1fffffffffffff90, &(0x7f000045c000)=ANY=[@ANYRES16], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x110}, 0x48) open_by_handle_at(r0, &(0x7f00000001c0)={0xfffffffffffffe91, 0x8, "2bba9c8180f31157220400bb4a93942a0ad1dcb661ee4e5d5e27402c13415a99c74b50255b87d12f82912d578ea4e9715961514b42562fe15cde3e841c45126936df29d01fdf61417d9028c6bd3c1b706c32e6f1bb77ea93a4ad43730fc605ff2d852dbd7db0f1d28fe803f0d763814b041e5d3044aa38208ac211ea0e128f6977d397b54eea8133b4b7a23d166a9a37f914872a76979bc4a17256c623f34b7d190fa626643c3a386d7307f3afa3670db2009b5de641c3d8de4bf6"}, 0x80000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0xffffff7f00000000, 0xe, 0x27, &(0x7f00000000c0)="3ba27506000000d3758d1363cd78", 0x0}, 0x36d) r1 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xffffffffffffffff, 0x208000) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000380)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000002c0)={0x57, 0x40, 0x7, {0x0, 0x2}, {0x101, 0x2}, @rumble={0x100, 0x38be}}) [ 727.520820] EXT4-fs (loop4): Invalid log block size: 64 [ 727.549830] EXT4-fs (loop1): Invalid log block size: 64 00:56:23 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100041019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 2: socketpair$unix(0x1, 0x43, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x5, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) r4 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_GET_REG_LIST(r4, 0xc008aeb0, &(0x7f00000000c0)={0x9, [0x6, 0x7, 0xd1c4, 0x88b, 0x9, 0xffffffff7fffffff, 0x4, 0x1, 0x74909d67]}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000140)="06082954c201", 0x6) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:23 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800074000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:23 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000319000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x3) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 727.747384] EXT4-fs (loop4): Invalid log block size: 64 [ 727.771176] EXT4-fs (loop0): Invalid log block size: 64 00:56:24 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x140, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x4, &(0x7f0000000100)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, @map={0x18, 0xf, 0x1, 0x0, r0}], &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 00:56:24 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80007a000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100100419000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100201019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x1, 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) 00:56:24 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100002019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 727.972029] EXT4-fs (loop1): Invalid log block size: 64 [ 727.980062] EXT4-fs (loop4): Invalid log block size: 64 00:56:24 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000519000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xd0c88c22eb9c3d20) 00:56:24 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000fc000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 728.139645] EXT4-fs (loop0): Invalid log block size: 64 [ 728.157987] EXT4-fs (loop1): Invalid log block size: 64 00:56:24 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100102019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = dup2(r0, r0) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000007700)={0x3c}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 00:56:24 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000619000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4100, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r1, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x80, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r5, 0x4c80, r6) [ 728.255269] EXT4-fs (loop4): Invalid log block size: 64 00:56:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x48a, 0x0) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f00000001c0)=0x11, 0x4) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000000180)={0x7b, 'syz0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:24 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100002319000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800fff000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000719000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8b6c, 0x2) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f00000000c0)) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 728.459764] EXT4-fs (loop0): Invalid log block size: 64 00:56:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="4bd545"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = fcntl$dupfd(r0, 0x406, r0) write$FUSE_INIT(r1, &(0x7f00000003c0)={0x50, 0x0, 0x6, {0x7, 0x1c, 0x3, 0x0, 0x6, 0x9, 0x3, 0xb1}}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x4, &(0x7f0000000080)=@raw=[@ldst={0x0, 0x3, 0x0, 0x3, 0x0, 0x7, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @alu={0x0, 0x3, 0x6, 0x6, 0x9, 0xfffffffffffffff0}], &(0x7f0000000100)='GPL\x00', 0x133, 0xaf, &(0x7f0000000140)=""/175, 0x41000, 0x1, [], r2, 0x6}, 0x48) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x20000, 0x0) r4 = socket$kcm(0xa, 0x100000002, 0x0) fcntl$addseals(r3, 0x409, 0x4) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000480)=@fragment={0x87, 0x0, 0x2, 0xffffffff, 0x0, 0x1ff, 0x66}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r5 = getpgrp(0xffffffffffffffff) fcntl$setownex(r4, 0xf, &(0x7f0000000300)={0x1, r5}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x40, 0x0) ioctl$SIOCX25GDTEFACILITIES(r6, 0x89ea, &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890b, &(0x7f0000000000)) 00:56:24 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000919000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 728.509058] EXT4-fs (loop4): Invalid log block size: 64 00:56:24 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100002d19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4200, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000200000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000070000004c0000000000000095000000000000002192ac6dba5299a7d8ac049a2d6e41e9815d11d4463581041a0bdc68e39ac704b9c9dace608dc6086c1250c9d613fca9c8f5dab0ad58f13851af6421f1292dff469ae6355b36d5e1e09a8eb9202e7ba47488ce1cdd1f6e26bd1c2bb1bd466ee7ab1c76938132cf26596af762276b680572a8c9daafb2b60a550795b1902a5812d7f04e44dca5e4c82519662d63a8afd1f45d7bcd"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 728.653308] EXT4-fs (loop1): Invalid log block size: 64 [ 728.672246] EXT4-fs (loop4): Invalid log block size: 64 00:56:25 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000a19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r1, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xfffffffffffffd42) [ 728.718030] EXT4-fs (loop0): Invalid log block size: 64 00:56:25 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100003f19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000100)='G\xffL\x00', 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:25 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000300000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000b19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 728.942901] EXT4-fs (loop4): Invalid log block size: 64 00:56:25 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4300, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 728.989183] EXT4-fs (loop0): Invalid log block size: 64 00:56:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8500000007000000f2e63b4d9548e9e7d30f7200009500200000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="08000500000225067f00ff030600000000000000"], &(0x7f0000000140)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000180)={r2, 0x4}, &(0x7f00000001c0)=0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r3 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 00:56:25 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000400000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100004019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="85d37c5c65040000070000004c000000000000d35c1bb6b08c72b23d"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x101, 0x200000) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f0000000100)={0x10000001, 0x4, 0x2f}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:25 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100041019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 729.113017] EXT4-fs (loop1): Invalid log block size: 64 00:56:25 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) accept$ax25(r1, &(0x7f0000000080)={{}, [@rose, @null, @default, @remote, @default, @bcast, @bcast, @null]}, &(0x7f0000000100)=0x48) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000140)={0x42, 0x1}, 0x10) [ 729.240047] EXT4-fs (loop4): Invalid log block size: 64 00:56:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x6, 0x280) r1 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:25 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4400, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 729.328205] EXT4-fs (loop1): Invalid log block size: 64 [ 729.335930] EXT4-fs (loop0): Invalid log block size: 64 00:56:25 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100201019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) r2 = socket$inet(0x2, 0x3, 0x6) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x9, 0x3, [0x100000000, 0x80000001, 0x3]}, &(0x7f0000000140)=0xe) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000180)={r3, @in={{0x2, 0x4e22, @broadcast}}}, 0x84) open$dir(&(0x7f0000000080)='./file0\x00', 0x400, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r3, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:25 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100004819000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3, 0x800) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r2, 0x0, 0x1, 0x4, 0x61ad}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timerfd_settime(r4, 0x0, &(0x7f0000000140)={{r5, r6+10000000}, {r7, r8+30000000}}, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 729.494357] EXT4-fs (loop4): Invalid log block size: 64 00:56:25 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000700000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0x0, 0x3}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 00:56:25 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100004c19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100002019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4500, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$sock_proto_private(r1, 0x89ec, &(0x7f0000000080)="083cab7839d7844bee581acce914004e2234b4fa68cc0331dde3b27e0da159fe2bb63c371a7c01beed825252a2065be3fa63f82cc3c5e33b7ba873f043b62683d8bb81a30f4a87ca19adec83904e28aae78d087e9dcfc6eb3c190fd10a9172719e39574f90553df991296158af3b0500207423a798b8b08e0631689e") setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000100)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10) r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) [ 729.706243] EXT4-fs (loop4): Invalid log block size: 64 00:56:26 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000260700000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 729.782712] EXT4-fs (loop0): Invalid log block size: 64 [ 729.806658] EXT4-fs (loop1): Invalid log block size: 64 00:56:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='personality\x00') ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 00:56:26 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100102019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 729.917067] EXT4-fs (loop4): Invalid log block size: 64 00:56:26 executing program 2: socketpair$unix(0x1, 0x800003, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:26 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000a00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x1, &(0x7f000045c000)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYBLOB="84639e06376af7ef2fdabafc2dd6a884a94ef53b77f9a3272628473187ff51cafce8d78537b0930a657a073db199f19c08aba529c2de28af2f80b5f394c15a7bd042c9b776f853061f5eeb46976b88b8f7b2bd5f8cd554dd3da01ddd35334e0df65be842695550d2ddf89650ebc97cdb14e8f58b011040e7f3359c383942441fe42a5a221619afabd5b6b847b42b1493c650ccf3275d6116d8315be0e45fc6ad7a83eca219fee1e939da15b9e11cce8f7b3e83086672e6061d25e3cdce86b904cf4eddaf287b92b3f8444093eb4c3d10eef5e18ee72ca303db8ced94280413f17e1d4547ec23073f70f15dd395", @ANYRESOCT=0x0]], &(0x7f0000281ffc)='G\xffL\x00', 0x0, 0x0, 0x0, 0xf221bb5fc47e5d9f, 0xfffffffffffffffd, [], 0x0, 0x7}, 0xffffffffffffff98) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f00000001c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$TIOCCBRK(r1, 0x5428) [ 730.032339] EXT4-fs (loop1): Invalid log block size: 64 00:56:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006819000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:26 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00'}) bind$packet(r1, 0xffffffffffffffff, 0xffb4) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r3, 0x2, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfffffffffffffffc, 0x1, 0x6}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4001}, 0x5) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x51b000, 0x0) ioctl$BLKROSET(r4, 0x125d, &(0x7f00000000c0)=0x20) syz_init_net_socket$x25(0x9, 0x5, 0x0) 00:56:26 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4600, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:26 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100002319000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 730.181142] EXT4-fs (loop4): Invalid log block size: 64 00:56:26 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f00000000c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1004000000015) 00:56:26 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000f00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 730.270325] EXT4-fs (loop0): Invalid log block size: 64 00:56:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006c19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:26 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x7fff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r1, 0x7, 0x30, 0x7fffffff, 0x1000}, &(0x7f0000000180)=0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r2) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev={[], 0x28}}, 0x14) socket$rds(0x15, 0x5, 0x0) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write$P9_RREMOVE(r0, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) write(r2, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 730.389579] EXT4-fs (loop1): Invalid log block size: 64 00:56:26 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100002d19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 730.442434] EXT4-fs (loop4): Invalid log block size: 64 00:56:26 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4700, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:26 executing program 5: 00:56:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100007419000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:26 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000001000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:26 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40000, 0x0) write$P9_RRENAME(r4, &(0x7f00000000c0)={0x7, 0x15, 0x1}, 0x7) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:26 executing program 5: [ 730.599717] EXT4-fs (loop1): Invalid log block size: 64 00:56:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100007a19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:26 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100003f19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 5: [ 730.725874] EXT4-fs (loop4): Invalid log block size: 64 00:56:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000f919000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) socket$vsock_dgram(0x28, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 00:56:27 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000001400000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 730.842801] EXT4-fs (loop1): Invalid log block size: 64 00:56:27 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 5: 00:56:27 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100004019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 730.922991] EXT4-fs (loop0): Invalid log block size: 64 [ 730.929065] EXT4-fs (loop4): Invalid log block size: 64 00:56:27 executing program 5: 00:56:27 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x2000000000) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f00000000c0)="e8833f8bc5418cb8aa89bd13daa685a494651ad7d6078300525dfdde07babb88b78bda3164c2bec7a13ae8d3ca2f8cac51a102d837f58735345032f5b8adaf4d2ac95b350a84184d16a2303f62d375742e3018faa2fdc29c04397573326e2caf810413a444fdd95e00a6a82a86cb43ccfd15037dac5fb3cfe30ef1c21c23f9a4ad53bf621e6880286677dda278dd98154f4130ef1719c65afd2c648457438ef2a6eb1bf6b89ca3e913280f0d805ca0f1c954939a0e9889f90592d0ae30e4c2c130cdf892819d", 0xc6) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xfffffffffffffffe, 0x0) ioctl$CAPI_GET_FLAGS(r4, 0x80044323, &(0x7f0000000240)) 00:56:27 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000261a00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000fc19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100004819000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 731.096211] EXT4-fs (loop1): Invalid log block size: 64 00:56:27 executing program 5: [ 731.175154] EXT4-fs (loop4): Invalid log block size: 64 00:56:27 executing program 5: mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$FUSE_INIT(r1, &(0x7f0000000000)={0x50}, 0x50) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) 00:56:27 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000001f00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x420000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) bind$packet(r2, &(0x7f0000000380)={0x11, 0x0, r3, 0x1, 0x3, 0x6, @random="390a63e66e88"}, 0x14) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x20, 0x0) ioctl$KVM_SET_TSC_KHZ(r4, 0xaea2, 0x8) close(r0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000100)={0x474, 0x1, 0xfffffffffffffff8, 0x401}, 0x10) r5 = socket(0x200000000000011, 0x803, 0x0) r6 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000080)={0x2, 0x7fff, 0x7, 0x0, 0x8, 0xffffffff}) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video36\x00', 0x2, 0x0) write(r0, &(0x7f0000000240)="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", 0x105) [ 731.286202] EXT4-fs (loop1): Invalid log block size: 64 00:56:27 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4900, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000fff19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:27 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100004c19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 731.349895] EXT4-fs (loop4): Invalid log block size: 64 00:56:27 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80ffffff1f00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000007000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000080)={0xd001, 0x2000, 0x100, 0x2, 0x3}) 00:56:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000219000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 731.480914] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 731.501954] EXT4-fs (loop1): Invalid log block size: 64 00:56:27 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 731.575575] EXT4-fs (loop4): Invalid log block size: 64 00:56:27 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8, 0x20000) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x14) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x3, 0xa, 0x4, 0x0, 0x4, 0x800, 0x7, 0x1, 0x2, 0x6, 0x0, 0x200, 0x2, 0x3, 0xfffffffffffffff9, 0x0, 0x9, 0x5, 0x800, 0x8, 0x100000001, 0x1, 0x1, 0x7fffffff, 0x6, 0x7, 0x200, 0xe4a, 0x7f, 0x9, 0x5, 0x1c, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0x100, 0x20, 0x8, 0x986, 0x7fffffff, 0x6}, r3, 0x5, r2, 0x1) syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0x0, 0x2) r4 = socket(0x200000000000011, 0x803, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000400)=0x7, 0xfffffdf3) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000002c0)) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:27 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000002500000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 731.644384] EXT4-fs (loop0): Invalid log block size: 64 [ 731.677803] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:27 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4a00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:28 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000319000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:28 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006819000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 731.774577] EXT4-fs (loop1): Invalid log block size: 64 [ 731.801805] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x11, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) ioctl(r1, 0x3, &(0x7f0000000080)="5a9a8a0703fa13db256cd666f2a42bffee5816a223682c") 00:56:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 731.859458] EXT4-fs (loop4): Invalid log block size: 64 [ 731.875654] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:28 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000042700000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 731.986023] EXT4-fs (loop0): Invalid log block size: 64 00:56:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:28 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006c19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:28 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000419000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$void(r1, 0xc0045878) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 732.136901] EXT4-fs (loop4): Invalid log block size: 64 00:56:28 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4b00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:28 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000042800000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:28 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100007419000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 732.206472] EXT4-fs (loop0): Invalid log block size: 64 00:56:28 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000519000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:28 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xffff, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f00000000c0)=0x2) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000140)=0x5) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000100)={0x0, 0x10000}) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 732.346176] EXT4-fs (loop4): Invalid log block size: 64 00:56:28 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000042900000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 732.404624] EXT4-fs (loop1): Invalid log block size: 64 00:56:28 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 732.463689] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 732.483852] EXT4-fs (loop0): Invalid log block size: 64 00:56:28 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100007a19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000100)="e34133e7626762cf480ed00f24", 0xd) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x511080, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB="2d0010006f00000000000000000000000300000000000000030000000000000004000000000000009f230d1a00"], 0x2d) 00:56:28 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000619000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 732.599191] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 732.633059] EXT4-fs (loop4): Invalid log block size: 64 00:56:28 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:28 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:28 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000fc19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:28 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000042a00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {r2, 0x5, 0x0, 0x0, 0x0, @ib={0x1b, 0x9c, 0x2, {"3d5e9cd4d6e4272358cd22967b4ce207"}, 0x0, 0x3d0, 0x6}, @in6={0xa, 0x4e20, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x40}}}, 0x118) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000719000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 732.755807] EXT4-fs (loop0): Invalid log block size: 64 [ 732.783885] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 732.814938] EXT4-fs (loop4): Invalid log block size: 64 00:56:29 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000819000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 732.881828] EXT4-fs (loop1): Invalid log block size: 64 00:56:29 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000042b00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:29 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 732.922765] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) accept4$bt_l2cap(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x80800) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:29 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000fff19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:29 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4d00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 733.022123] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 733.044836] EXT4-fs (loop4): Invalid log block size: 64 [ 733.051406] EXT4-fs (loop0): Invalid log block size: 64 00:56:29 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:29 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000042c00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x2) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x5fb, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) write$FUSE_ATTR(r4, &(0x7f0000000340)={0x78, 0x0, 0x2, {0x8, 0xff, 0x0, {0x6, 0x3f, 0x5, 0x5, 0x5, 0x7, 0xffffffff, 0x160d, 0x24bb, 0x4, 0xffffffff, r5, r6, 0x6, 0x200}}}, 0x78) write(r0, &(0x7f0000000000)="e8833f8bc54188b8aa000013db74", 0xe) setsockopt(r2, 0x4a9e, 0x0, &(0x7f0000000080)="4d2b43fc0b083308cf389d43d34e230ba4a5537a237f60d7e59fea6d11a5506f12490f53077de92df547a80b43e04b8a24b178e9fca4f91603a2f2323aed", 0x3e) 00:56:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000919000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:29 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000007000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 733.233090] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 733.268306] EXT4-fs (loop4): Invalid log block size: 64 00:56:29 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:29 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000043200000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:29 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4e00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000a19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 733.384492] EXT4-fs (loop0): Invalid log block size: 64 [ 733.404918] EXT4-fs (loop1): Invalid log block size: 64 [ 733.415364] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:29 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000080)={0x80000000}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 733.509551] EXT4-fs (loop4): Invalid log block size: 64 00:56:29 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000219000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 733.557179] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:29 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:29 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000003b00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 733.635819] EXT4-fs (loop0): Invalid log block size: 64 00:56:29 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000319000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000b19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0x3, @local, 0x401}, {0xa, 0x4e21, 0x8, @ipv4={[], [], @remote}, 0x5}, 0x0, [0x3, 0xfff, 0x5, 0xfffffffffffffff9, 0x7, 0x7, 0x8, 0x8ef]}, 0x5c) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r4, 0x402c5639, &(0x7f00000000c0)={0x0, 0x3, 0x1}) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 733.746856] EXT4-fs (loop4): Invalid log block size: 64 [ 733.757632] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:30 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4f00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:30 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000003f00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:30 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000419000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:30 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100002319000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 733.877427] EXT4-fs (loop0): Invalid log block size: 64 [ 733.910069] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:30 executing program 2: socketpair$unix(0x1, 0x800000000000, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x100000000, 0x40) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x11000}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="48000000310002002abd70005a646f02d8cced530c179c59fbdbdf25000000010000000000000000000008025b0bbe706600000010001b0b00000819c7570003009c000010000010001700000008000300dd0a0000aa691cc139f7d15abe2b9f8db16109f7c459203e00dfee9493eb6907584c2099f944afcbaec5f4c8cd4289345111e542f554a2f7165d789eead33611c9d65cfdf95be331ad8136423418c292e88847509bdfa2707d23436a27df6a5e95d9a089d46281fd58"], 0x48}, 0x1, 0x0, 0x0, 0x40040}, 0x80) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000180)=0x10000, 0x4) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller1\x00', 0x5900}) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 733.990463] EXT4-fs (loop4): Invalid log block size: 64 00:56:30 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000519000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:30 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000004000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 734.086549] EXT4-fs (loop0): Invalid log block size: 64 [ 734.099884] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:30 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100002d19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:30 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x1, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f0000000140)={0x0, 0x200, 0x3ff, 0xffe0000000000000, 0xffff, 0x1}) write$selinux_validatetrans(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="73797374656d5f753a6f00000000745f723a746d705f743a73302073797374656d5f753a6f626a6563745fdc69d71e7472616e735f7661725f72756e5f743a733020303030303030303030303030303030303230343720756e636f6e66696e656400"], 0x62) 00:56:30 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000619000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 734.249627] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 734.265903] EXT4-fs (loop4): Invalid log block size: 64 00:56:30 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:30 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000264200000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:30 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:30 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000719000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 734.359238] EXT4-fs (loop0): Invalid log block size: 64 00:56:30 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100004819000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 734.424347] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:30 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000819000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 734.543628] EXT4-fs (loop4): Invalid log block size: 64 [ 734.574784] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 734.587396] EXT4-fs (loop0): Invalid log block size: 64 00:56:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000100)={{0x7, 0x3, 0x5a, 0x6, 'syz1\x00', 0x3}, 0x5, 0x200, 0x100000000, r1, 0x4, 0x100000000, 'syz1\x00', &(0x7f00000000c0)=['&\x00', 'nr0\x00', 'nr0\x00', 'nr0\x00'], 0xe, [], [0x7ff, 0x2, 0x4605]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r2) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00'}) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r2, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x1, 0x4) 00:56:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:30 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000919000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:30 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000003a700000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 734.723836] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:31 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5100, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100004c19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:31 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000a19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 734.783741] EXT4-fs (loop4): Invalid log block size: 64 00:56:31 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000003b300000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x400400, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000140)={0x2, 0x5, 0x100, 0x1}) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r4, 0x89b7, &(0x7f0000000080)={'gre0\x00', @ifru_hwaddr}) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000040)={'ip6gretap0\x00', {0x2, 0x4e20, @multicast1}}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'np0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:31 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000b19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 734.925721] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 734.989387] EXT4-fs (loop4): Invalid log block size: 64 [ 735.008782] EXT4-fs (loop0): Invalid log block size: 64 00:56:31 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5200, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100002319000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000025e800000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 735.098469] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:31 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006819000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x0, 0x0) ioctl$KDDISABIO(r1, 0x4b37) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @local}}, 0x0, 0x4, 0x2, 0x6, 0x40}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @empty}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000300)={r7, 0x7, 0x1, 0x800, 0x8000, 0x7, 0x3, 0x19, {r8, @in={{0x2, 0x4e23, @multicast2}}, 0x8, 0x3, 0x1, 0x5, 0x94}}, &(0x7f00000003c0)=0xb0) 00:56:31 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100002d19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 735.253786] EXT4-fs (loop4): Invalid log block size: 64 [ 735.267791] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:31 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006c19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:31 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000025f100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100004819000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_ifreq(r0, 0x891c, &(0x7f00000001c0)={'bond_slave_0\x00', @ifru_flags=0x2}) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x3, 0x2) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x200000000000007, 0xff17) r5 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x8001, 0x208000) syz_open_dev$sndmidi(&(0x7f0000000240)='/dev/snd/midiC#D#\x00', 0xffffffffffffff98, 0xc00) ioctl$TIOCSCTTY(r5, 0x540e, 0x100) getsockopt$rose(r3, 0x104, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) fstat(r1, &(0x7f0000000140)) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:31 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5300, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100007419000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100004c19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 735.422624] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 735.448624] EXT4-fs (loop4): Invalid log block size: 64 00:56:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:31 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000025f800000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x2) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:31 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 735.577558] EXT4-fs (loop0): Invalid log block size: 64 [ 735.586255] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:31 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100007a19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:31 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006819000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 735.650788] EXT4-fs (loop4): Invalid log block size: 64 [ 735.722346] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0xf5, r3, 0x1, 0x80000001, 0x6, @remote}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f00000000c0)) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 735.767688] EXT4-fs (loop0): Invalid log block size: 64 00:56:32 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5400, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100006c19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="807ffffff900000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000f919000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 735.852903] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 735.888278] EXT4-fs (loop4): Invalid log block size: 64 00:56:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:32 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100007419000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000002d000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x1ff) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xf5d44d64) 00:56:32 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000025fb00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100007a19000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 736.029314] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000f9000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:32 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5500, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000002d000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000007000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 736.126058] EXT4-fs (loop4): Invalid log block size: 64 [ 736.163744] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x7c, r4, 0x520, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf8b7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:32 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="807fffffff00000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000003b000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 736.271166] EXT4-fs (loop0): Invalid log block size: 64 [ 736.288268] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 736.369799] EXT4-fs (loop4): Invalid log block size: 64 [ 736.380799] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={r3, 0x1}, 0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000002d000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:32 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000003f000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 736.510347] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:32 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5600, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800002000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000f9000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x67fc7778, 0x142) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0x1) write$nbd(r1, &(0x7f0000000240)={0x67446698, 0x0, 0x3, 0x1, 0x1, "e2c2639bdb95faef290384d5728eab981741e23a31b160175554b46480dce6db28b80983dcad9f9918fc58ce5715af627d089738e6e4af85615ae77a18c4ec739ed671fec5b5d50e923b84945707bc353bc084eda00f"}, 0x66) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000400)=0x7, 0x1) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, 0xf, 0x1b, 0x1d, "790749e911b3c5de8dce1ac917544eb740a130c55d522a1ef10015b0e35a5980d619f68af700070fedb34ef6c5f1263d274dddb6806f971971010aa0a925ae5b", "8cdb1252662d0968e148d3b1b45fa8b870e6ba8409d1ff9ffa2747a14902403c0bf4134919825b25b857b582c2fe0d8407eb32f692b9954cac171e3724a28edf", "c690745af4f45045494a473373a37eabd0f2b120b24896ff2cc782a0a50c8546", [0xd150, 0xfff]}) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 736.606536] EXT4-fs (loop4): Invalid log block size: 64 00:56:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019020300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:33 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800003000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 736.931915] EXT4-fs (loop0): Invalid log block size: 64 00:56:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 737.043946] EXT4-fs (loop4): Invalid log block size: 64 00:56:33 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5700, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 737.889689] device bridge_slave_1 left promiscuous mode [ 737.895297] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.966577] device bridge_slave_0 left promiscuous mode [ 737.972083] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.173618] device hsr_slave_1 left promiscuous mode [ 738.230800] device hsr_slave_0 left promiscuous mode [ 738.310288] team0 (unregistering): Port device team_slave_1 removed [ 738.323964] team0 (unregistering): Port device team_slave_0 removed [ 738.343631] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 738.408496] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 738.539765] bond0 (unregistering): Released all slaves [ 739.282557] IPVS: ftp: loaded support on port[0] = 21 [ 739.476765] chnl_net:caif_netlink_parms(): no params data found [ 739.517195] bridge0: port 1(bridge_slave_0) entered blocking state [ 739.523627] bridge0: port 1(bridge_slave_0) entered disabled state [ 739.531222] device bridge_slave_0 entered promiscuous mode [ 739.538751] bridge0: port 2(bridge_slave_1) entered blocking state [ 739.545416] bridge0: port 2(bridge_slave_1) entered disabled state [ 739.552899] device bridge_slave_1 entered promiscuous mode [ 739.573421] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 739.583640] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 739.615243] team0: Port device team_slave_0 added [ 739.637088] team0: Port device team_slave_1 added [ 739.758463] device hsr_slave_0 entered promiscuous mode [ 739.816009] device hsr_slave_1 entered promiscuous mode [ 739.972068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 739.992534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 740.000014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 740.036747] 8021q: adding VLAN 0 to HW filter on device team0 [ 740.053105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 740.071304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 740.091195] bridge0: port 1(bridge_slave_0) entered blocking state [ 740.097583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 740.135832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 740.142960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 740.166637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 740.174249] bridge0: port 2(bridge_slave_1) entered blocking state [ 740.180628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 740.206069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 740.213962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 740.236462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 740.244285] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 740.274614] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 740.285582] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 740.302669] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 740.310507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 740.324425] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 740.332269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 740.345638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 740.353672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 740.367146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 740.385441] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 740.398214] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 740.464608] EXT4-fs (loop1): Invalid log block size: 64 00:56:36 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000007000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x34d180, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x100, 0x0) linkat(r1, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x1400) r3 = socket(0x200000000000011, 0x803, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000280)={0x40, 0x5, @value=0x4}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f00000003c0)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000440)={r6, 0x80, 0x6}, &(0x7f00000004c0)=0x8) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xb6000}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000100)=r7, 0x4) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x10040, 0x0) 00:56:36 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800004000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:36 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019030300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:36 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5800, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 740.610461] EXT4-fs (loop4): Invalid log block size: 64 00:56:36 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019040300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:36 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800005000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 740.694578] EXT4-fs (loop1): Invalid log block size: 64 00:56:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, 0x0) 00:56:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000080)=0x80000000, 0x4) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:37 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000002d000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 740.809641] EXT4-fs (loop0): Invalid log block size: 64 00:56:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, 0x0) 00:56:37 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5900, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 740.917387] EXT4-fs (loop4): Invalid log block size: 64 00:56:37 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x10, 0x0, &(0x7f0000000000)) r5 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) r6 = gettid() get_robust_list(r6, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$TCSBRKP(r5, 0x5425, 0x2) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:37 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800006000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:37 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019050300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, 0x0) [ 741.032475] EXT4-fs (loop1): Invalid log block size: 64 00:56:37 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000003b000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 741.133555] EXT4-fs (loop4): Invalid log block size: 64 00:56:37 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019060300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:37 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5a00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:37 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800007000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:37 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019020300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 741.426013] EXT4-fs (loop0): Invalid log block size: 64 [ 741.431581] EXT4-fs (loop4): Invalid log block size: 64 00:56:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:37 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = socket$inet6(0xa, 0x200000000000001, 0x0) clone(0x100000001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}, 0x0) setsockopt$inet_buf(r3, 0x0, 0x100000040, &(0x7f0000000040), 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f00000000c0)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:37 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800008000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:37 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019030300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:37 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019070300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:37 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5b00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 741.700582] EXT4-fs (loop4): Invalid log block size: 64 00:56:37 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019040300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:38 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019080300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:38 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800009000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:38 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019090300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:38 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019050300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 742.017393] EXT4-fs (loop4): Invalid log block size: 64 00:56:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) write(r0, &(0x7f0000000080)="e8833f8bc5418cb8aa89bd13daa6", 0xfffffffffffffe91) 00:56:38 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019060300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:38 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5c00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:38 executing program 5: sched_rr_get_interval(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x100000000000000d) 00:56:38 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000190a0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:38 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000a000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:38 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019070300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 742.296967] EXT4-fs (loop4): Invalid log block size: 64 00:56:39 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000b000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:39 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x400448e7, &(0x7f0000000100)) [ 742.859509] EXT4-fs (loop1): Invalid log block size: 64 00:56:39 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019080300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0xfffffffffffffd7c) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:39 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5d00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0x2000000000000bf}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x15) [ 743.014229] EXT4-fs (loop4): Invalid log block size: 64 [ 743.089154] EXT4-fs (loop1): Invalid log block size: 64 00:56:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x810, 0x4) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xfe, 0x100) ioctl$KVM_SET_GSI_ROUTING(r5, 0x4008ae6a, &(0x7f0000000100)={0x4, 0x0, [{0x4, 0x2, 0x0, 0x0, @irqchip={0x5, 0x6}}, {0x3ff, 0x3, 0x0, 0x0, @sint={0x8}}, {0xfffffffffffffffe, 0x5, 0x0, 0x0, @irqchip={0xad8b, 0x3507}}, {0x81, 0x3, 0x0, 0x0, @irqchip={0x80}}]}) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) inotify_init() 00:56:39 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800023000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:39 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019090300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 743.235016] EXT4-fs (loop4): Invalid log block size: 64 [ 743.318963] EXT4-fs (loop1): Invalid log block size: 64 [ 743.738130] device bridge_slave_1 left promiscuous mode [ 743.743806] bridge0: port 2(bridge_slave_1) entered disabled state [ 743.798166] device bridge_slave_0 left promiscuous mode [ 743.804356] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.058765] device hsr_slave_1 left promiscuous mode [ 744.124574] device hsr_slave_0 left promiscuous mode [ 744.190350] team0 (unregistering): Port device team_slave_1 removed [ 744.209663] team0 (unregistering): Port device team_slave_0 removed [ 744.228104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 744.287451] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 744.432018] bond0 (unregistering): Released all slaves [ 745.342411] IPVS: ftp: loaded support on port[0] = 21 [ 745.513225] chnl_net:caif_netlink_parms(): no params data found [ 745.596285] bridge0: port 1(bridge_slave_0) entered blocking state [ 745.602704] bridge0: port 1(bridge_slave_0) entered disabled state [ 745.609955] device bridge_slave_0 entered promiscuous mode [ 745.627347] bridge0: port 2(bridge_slave_1) entered blocking state [ 745.633755] bridge0: port 2(bridge_slave_1) entered disabled state [ 745.656695] device bridge_slave_1 entered promiscuous mode [ 745.676592] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 745.686042] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 745.715816] team0: Port device team_slave_0 added [ 745.723190] team0: Port device team_slave_1 added [ 745.823634] device hsr_slave_0 entered promiscuous mode [ 745.886043] device hsr_slave_1 entered promiscuous mode [ 745.934794] bridge0: port 2(bridge_slave_1) entered blocking state [ 745.941197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 745.947863] bridge0: port 1(bridge_slave_0) entered blocking state [ 745.954215] bridge0: port 1(bridge_slave_0) entered forwarding state [ 746.013121] 8021q: adding VLAN 0 to HW filter on device bond0 [ 746.031875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 746.040224] bridge0: port 1(bridge_slave_0) entered disabled state [ 746.066852] bridge0: port 2(bridge_slave_1) entered disabled state [ 746.086767] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 746.099206] 8021q: adding VLAN 0 to HW filter on device team0 [ 746.129193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 746.137315] bridge0: port 1(bridge_slave_0) entered blocking state [ 746.143656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 746.186595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 746.194229] bridge0: port 2(bridge_slave_1) entered blocking state [ 746.200620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 746.238006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 746.246462] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 746.254180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 746.262074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 746.271995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 746.279651] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 746.303357] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 746.349872] EXT4-fs (loop0): Invalid log block size: 64 00:56:42 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000190b0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:42 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getrusage(0xffffffffffffffff, &(0x7f0000000080)) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000140)="f972e60ba7211f67fbc7cfa92efec1c0c1ceb77260c25f2ac41eccee370ee925890be3badc0f2e258a42c3c80f849fd66007578c62492c5a1aeabdea331718cf6160f54aabb2741dbf803a23377546fabfd8cbcd4ef1053754252dad3d473552ae0f7b6352a60cb56e4401d744678eca04b4e7ef1e134e17a6bc5030b48e93f8f14eadbb58766b627b33dc4685fe6399799ebf795cc9659f3e43a430181d46b7202f7b8124f57b02512d389dba323da1b568a76542a5e9843228bdd4", 0xbc) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:42 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5e00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:42 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80002d000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:42 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000190a0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = socket$inet6(0xa, 0x200000000000001, 0x0) clone(0x100000001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}, 0x0) setsockopt$inet_buf(r3, 0x0, 0x100000040, &(0x7f0000000040), 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f00000000c0)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 746.482868] EXT4-fs (loop4): Invalid log block size: 64 00:56:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = socket$inet6(0xa, 0x200000000000001, 0x0) clone(0x100000001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}, 0x0) setsockopt$inet_buf(r3, 0x0, 0x100000040, &(0x7f0000000040), 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f00000000c0)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:42 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800048000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 746.560287] EXT4-fs (loop1): Invalid log block size: 64 [ 746.578139] EXT4-fs (loop0): Invalid log block size: 64 00:56:42 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000190b0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = socket$inet6(0xa, 0x200000000000001, 0x0) clone(0x100000001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}, 0x0) setsockopt$inet_buf(r3, 0x0, 0x100000040, &(0x7f0000000040), 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f00000000c0)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:42 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xff, 0x1) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'GPLkeyringbdevvboxnet0'}}, {@nodevmap='nodevmap'}, {@cache_none='cache=none'}, {@cache_loose='cache=loose'}, {@debug={'debug', 0x3d, 0xfffffffffffffff7}}, {@access_uid={'access', 0x3d, r3}}, {@access_user='access=user'}, {@mmap='mmap'}], [{@uid_lt={'uid<', r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x35, 0x33, 0x35, 0x7e, 0x77, 0x35, 0x64], 0x2d, [0x30, 0x65, 0x3b, 0x76], 0x2d, [0x39, 0x0, 0x1e9dafbd11f9ae4b, 0x62], 0x2d, [0x31, 0x64, 0x38, 0x33], 0x2d, [0x0, 0x36, 0x36, 0x39, 0x75, 0x30, 0x67, 0x73]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'nr0\x00'}}]}}) r5 = socket(0x200000000000011, 0x803, 0x0) r6 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x10, 0x0, &(0x7f0000000000)) r5 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) r6 = gettid() get_robust_list(r6, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$TCSBRKP(r5, 0x5425, 0x2) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019230300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5f00, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 746.761210] EXT4-fs (loop4): Invalid log block size: 64 [ 746.767051] EXT4-fs (loop1): Invalid log block size: 64 00:56:43 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80004c000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$RTC_PIE_OFF(r2, 0x7006) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:43 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019230300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 746.926367] EXT4-fs (loop4): Invalid log block size: 64 00:56:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000192d0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000192d0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800060000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019480300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x62d) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) socket$can_raw(0x1d, 0x3, 0x1) connect$unix(r2, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) recvfrom$inet6(r2, &(0x7f00000001c0)=""/40, 0x28, 0x10120, 0x0, 0x0) setsockopt$packet_int(r2, 0x107, 0x18, &(0x7f0000000240)=0x3, 0x41) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000380)=0x77b, 0x4) getsockname$llc(r2, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000002c0)=0x10) getsockopt$sock_int(r3, 0x1, 0x3f, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f00000003c0)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r5, 0x4, 0x8}, 0xc) [ 747.136352] EXT4-fs (loop4): Invalid log block size: 64 00:56:43 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='personality\x00') ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 00:56:43 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019480300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800068000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 747.231671] EXT4-fs (loop0): Invalid log block size: 64 00:56:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x8c02) write(r1, &(0x7f0000000140)="b63d08050008000000fae869d2bc7098cebc9bc2de96d0f0279df4ffff2d000000fbfffffdd276f0eed4caf43c9c", 0x2e) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000000)=""/97, 0x61}, {&(0x7f0000000080)=""/43, 0x1f9}], 0x2) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000194c0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 747.361346] EXT4-fs (loop4): Invalid log block size: 64 [ 747.375958] EXT4-fs (loop1): Invalid log block size: 64 00:56:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019600300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r1 = dup2(r0, r0) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000007700)={0x3c}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r2 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 00:56:43 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x801, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}}, 0x80, 0x0, 0x0, &(0x7f00000004c0)=[{0xe0, 0x119, 0x2, "a3da3170c93fc10c2dd592ae83b2e827c24aa6f5925adad3aac85d7009ff09fa72dc03775719326d9855bd7f48595d15a8d1b05034945e1ecf364f49a1378887537c6ee7b5d95844ac7b5a1c9a497e14d36a87bea7b9a1a4e9a6a937b82ebfa7e0b046aed056990ff08e4141d0d1f2a30bb9b150371ca7b18dbda60ff5439c0a8b0ddcade84cfaaaf4fbf621a45eda7371abb4da20279063502508d8eb2109b5ba63414ab9d20fb2f28accaca51e00dd8ace35b283cb106f019aa3cb7d48fb5e81bcdf1bb72220ab09cc5a"}, {0x98, 0x11d, 0x2, "3b6c6555b3145c077bc8e6b4141e63c8550a6ab93c7c41366ffd450cf0a52e8fc38d473fde4ae02ebebf94359db3e2196e58fa95d48e3e384730b23b9df740801c2a4e5f49f6071e1ddb563bf011dc5698d2f86268e780c42b0ab82b496f5b23b4455a7e444ab42528ecfc9985b3a809243de3b69e6c24e54f834ed438e4a2549c13b65a0cc0ec05"}, {0x88, 0x101, 0x0, "70dfae73431f19855cdbed1dc1823757175aab3f120033ba7b179ff84b2d3e043880fbae77823bda825e7d1ba2c8bfaaf841ce554074546e2a481feba0b370aa45894fec6f9db1ec22514f27c59cc897c7451a5fab068663dfb6f8f43ec949e34c79cfc7a1363c8558e0da4a2021ae4c3e2843ae78fb"}, {0x78, 0x0, 0x833e, "6cb264a6bf1abccac4bef75f247992ebc76b2c962cde468573814e518c73126d724eeb7e75fb36d72571ab695de46b32af0d8fbdbd0ddd30f875f66edf8be343147242d824b7ed7f6a80b4cbb806a33d7d0ebbbc35a2632a4087bcd227829ef9114296bd229b7b"}, {0x28, 0x19f, 0x8, "c20fe165ba35021fc59e81ce0b93fa26e9e074787f30fa7f"}, {0x10, 0x18e, 0x4}, {0xc0, 0x119, 0x5, "83ee0f76bdc8827c88a66f088202f4f022905bb6c2c81e22dc4442c0e328abfb1315e3eac4d5465da8637449f6cd20e35fbd78eb5f1854de0a679838bd6a64b7d69afb5da981fb7059d89015d953ae12e96da4db853e1c17cff09c03b62024aff7e452b6458c11bc45e22bb21d2716a6f078eccb7cb749c40bca9892c951396148b0a956f5751bf21d0abb0dccf40bca9a2d1d57832e3e0539c75ec0bbe30ff3be4ee9b82422fe31da45e19757717abd"}, {0xd0, 0x113, 0x0, "dfbabf442aba7aae53d06f16805f6fc17d43f270547db7d118b707cabc282203ccafc07b8e860854600722e6d75f517e0f9489ed286f5161d9f250cf1802f2e2d8d029a94b2d4808c07db6d9cb85111eb502760d0d9c7f88952965d1a7b96b5c0d75a7e743747165949b641cbb35929e4e80cf2e3e8a1ab6b2a1985ebdcd8712e78c16e6a6403aaa96ace24fabf56413d84abe9d1f32ee39f4a9d6c000a8d9d43e8d5c8f899448ebc07d4dfec61011bff1432b7592da40043e57f9fdbc01cf31"}, {0x28, 0x100, 0x8, "911880e18b51e4f73ecfd89d40ffa89d95bebffe"}], 0x468}, 0x801) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r1) r2 = socket(0x3, 0x803, 0x20) syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r1, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:43 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000194c0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80006c000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x40) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 747.565297] EXT4-fs (loop0): Invalid log block size: 64 00:56:43 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6100, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019680300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019600300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) preadv(r1, &(0x7f00000023c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/247, 0xf7}, {&(0x7f0000000080)=""/45, 0x2d}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/159, 0x9f}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6, 0x0) [ 747.647019] EXT4-fs (loop4): Invalid log block size: 64 00:56:43 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800074000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80040, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:44 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019680300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 747.785039] EXT4-fs (loop0): Invalid log block size: 64 [ 747.808013] EXT4-fs (loop4): Invalid log block size: 64 [ 747.821912] QAT: Invalid ioctl 00:56:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) r1 = socket$kcm(0xa, 0x100000002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={r1}) [ 747.840158] QAT: Invalid ioctl 00:56:44 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000196c0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:44 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000196c0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:44 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80007a000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x22b) r2 = dup2(r1, r0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000240)=0x4) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x20, &(0x7f0000000400)=0x7, 0x2db) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000001c0)=0x8a9f3, 0xfffffffffffffcf9) recvfrom$inet(r5, &(0x7f00000000c0)=""/148, 0x94, 0x40, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) 00:56:44 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6200, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:44 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x301002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/19) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x200001, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) r5 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3ff, 0x1) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000300)) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000200)={'bridge_slave_0\x00'}) getsockname(r5, &(0x7f00000004c0)=@ipx, &(0x7f0000000380)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vcan0\x00', 0x0}) r7 = semget(0x3, 0x1, 0x40) semctl$SETALL(r7, 0x0, 0x11, &(0x7f00000000c0)=[0x79fd05da, 0x93, 0x81, 0x5, 0x1000, 0x0]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000002000)={@local, 0x7e, r6}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x1, 0xfddb) setsockopt$inet_int(r4, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) r8 = dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f00000003c0)) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r9, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) fcntl$dupfd(r8, 0x406, r1) r10 = semget$private(0x0, 0x7, 0x400) semtimedop(r10, &(0x7f0000000140)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r10, &(0x7f0000000040)=[{0x0, 0x7fffffff}, {}], 0x2) semctl$SETALL(r10, 0x0, 0x11, &(0x7f0000000080)=[0x1]) [ 748.003224] EXT4-fs (loop0): Invalid log block size: 64 [ 748.012781] EXT4-fs (loop1): Invalid log block size: 64 [ 748.019612] EXT4-fs (loop4): Invalid log block size: 64 00:56:44 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019740300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) r4 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r4, &(0x7f0000ffc000/0x4000)=nil, 0x4000) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, &(0x7f00000001c0)=0x7, 0x7, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:44 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000fc000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:44 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019740300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:44 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000197a0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 748.246021] EXT4-fs (loop0): Invalid log block size: 64 [ 748.270996] mmap: syz-executor2 (4393) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 00:56:44 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000197a0300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 748.327209] EXT4-fs (loop4): Invalid log block size: 64 00:56:44 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000030100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:44 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019f90300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x400000) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f00000007c0)={@multicast2, @loopback, 0x0}, &(0x7f0000000800)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000840)={'caif0\x00', r4}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) r6 = shmget(0x1, 0x4000, 0x108, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_LOCK(r6, 0xb) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:44 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6300, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 748.431885] EXT4-fs (loop0): Invalid log block size: 64 [ 748.459491] EXT4-fs (loop1): Invalid log block size: 64 00:56:44 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000500e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 748.527306] EXT4-fs (loop4): Invalid log block size: 64 [ 748.652587] EXT4-fs (loop1): Invalid log block size: 64 00:56:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x301002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/19) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x200001, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) r5 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3ff, 0x1) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000300)) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000200)={'bridge_slave_0\x00'}) getsockname(r5, &(0x7f00000004c0)=@ipx, &(0x7f0000000380)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'vcan0\x00', 0x0}) r7 = semget(0x3, 0x1, 0x40) semctl$SETALL(r7, 0x0, 0x11, &(0x7f00000000c0)=[0x79fd05da, 0x93, 0x81, 0x5, 0x1000, 0x0]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000002000)={@local, 0x7e, r6}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x1, 0xfddb) setsockopt$inet_int(r4, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) r8 = dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f00000003c0)) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r9, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) fcntl$dupfd(r8, 0x406, r1) r10 = semget$private(0x0, 0x7, 0x400) semtimedop(r10, &(0x7f0000000140)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r10, &(0x7f0000000040)=[{0x0, 0x7fffffff}, {}], 0x2) semctl$SETALL(r10, 0x0, 0x11, &(0x7f0000000080)=[0x1]) 00:56:45 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800010040100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:45 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000500e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:45 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_S_EDID(r4, 0xc0285629, &(0x7f0000000100)={0x0, 0x81, 0x0, [], &(0x7f00000000c0)=0x7}) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:45 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000700e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:45 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6400, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:45 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000a00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 749.105791] EXT4-fs (loop4): Invalid log block size: 64 00:56:45 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000050100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 749.190315] EXT4-fs (loop0): Invalid log block size: 64 00:56:45 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x14}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r3, 0x200, 0x70bd26, 0x1f, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4e8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x128000000000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffff7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000280)) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x200, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000300)={0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000780)={0x104, 0x0, &(0x7f0000000540)=[@acquire_done={0x40106309, r5, 0x1}, @transaction_sg={0x40486311, {{0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000340), &(0x7f0000000380)=[0x78]}, 0x6}}, @transaction={0x40406300, {0x4, 0x0, 0x4, 0x0, 0x10, 0x0, 0x0, 0x50, 0x10, &(0x7f0000000440)=[@fd={0x66642a85, 0x0, r2, 0x0, 0x3}, @fd={0x66642a85, 0x0, r0, 0x0, 0x2}, @fda={0x66646185, 0x2, 0x4, 0x10}], &(0x7f00000003c0)=[0x0, 0x0]}}, @reply_sg={0x40486312, {{0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, &(0x7f00000004c0), &(0x7f0000000500)=[0x48, 0x38, 0x38, 0x38, 0x28, 0x38, 0x20, 0x68]}, 0xfff}}, @request_death={0x400c630e, 0x0, 0x1}, @enter_looper], 0xd7, 0x0, &(0x7f0000000680)="5efbe84db3bc076f6e2bb1343e655e7f6a36dab41b2bdc0ea7e70811e30dc04650a024d86e6757d466aca63261e31c5ee0ed729a8f623a13760425ff09b344a73f4fdb1bbb758a71bf3a72703fdc41acf37cf16ec1a731a8cff971c3d31ef6a6ca407ae41f4f2883b50554943e4a5fd0c95fd89e2466f42c9001e7649401ec8fe6259530d5a3fcceae6f083d43688ebc80f62d6bc13290220862f01467632b46ba5ef9d79d2d0ca0afb5ab5ceb40a108f911309efc892a748252439f21d045a9f2829c9dc79f808776a80a77000af7b2843bf14f4953cd"}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:45 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000700e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:45 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019001400e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 749.294079] EXT4-fs (loop4): Invalid log block size: 64 00:56:45 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019002d00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 749.401346] EXT4-fs (loop0): Invalid log block size: 64 00:56:46 executing program 5 (fault-call:3 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:46 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xb000, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:46 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) socketpair(0x5, 0xa, 0x9, &(0x7f00000000c0)) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000100)=0x8000, 0x2) fcntl$dupfd(r2, 0x0, r2) 00:56:46 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000060100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:46 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019003b00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:46 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000a00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:46 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019001400e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 750.044298] EXT4-fs (loop1): Invalid log block size: 64 [ 750.054236] EXT4-fs (loop4): Invalid log block size: 64 [ 750.072013] FAULT_INJECTION: forcing a failure. [ 750.072013] name failslab, interval 1, probability 0, space 0, times 0 [ 750.112269] CPU: 1 PID: 4507 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 750.119311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.128660] Call Trace: [ 750.131257] dump_stack+0x172/0x1f0 [ 750.134895] should_fail.cold+0xa/0x1b [ 750.138792] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 750.143998] ? lock_downgrade+0x810/0x810 [ 750.148148] ? ___might_sleep+0x163/0x280 [ 750.152304] __should_failslab+0x121/0x190 [ 750.156542] should_failslab+0x9/0x14 [ 750.160341] __kmalloc+0x2dc/0x740 [ 750.163945] ? __might_fault+0x12b/0x1e0 [ 750.168066] ? snd_ctl_new+0x5b/0x1b0 [ 750.171869] snd_ctl_new+0x5b/0x1b0 [ 750.175501] snd_ctl_elem_add+0x544/0x13e0 [ 750.179750] ? snd_ctl_new1+0x6a0/0x6a0 [ 750.183731] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 750.189286] ? _copy_from_user+0xdd/0x150 [ 750.193441] snd_ctl_elem_add_user+0xc6/0x180 [ 750.197933] ? snd_ctl_elem_add_compat+0x3f0/0x3f0 [ 750.202893] ? mark_held_locks+0x100/0x100 [ 750.207129] ? proc_fail_nth_write+0x9d/0x1e0 [ 750.211631] snd_ctl_ioctl+0x937/0xf50 [ 750.215519] ? snd_ctl_elem_add_user+0x180/0x180 [ 750.220271] ? __fget+0x340/0x540 [ 750.223740] ? ___might_sleep+0x163/0x280 [ 750.227887] ? __might_sleep+0x95/0x190 [ 750.231874] ? snd_ctl_elem_add_user+0x180/0x180 [ 750.236629] do_vfs_ioctl+0xd6e/0x1390 [ 750.240520] ? selinux_file_ioctl+0x46f/0x5e0 [ 750.245019] ? selinux_file_ioctl+0x125/0x5e0 [ 750.249524] ? ioctl_preallocate+0x210/0x210 [ 750.253932] ? selinux_file_mprotect+0x620/0x620 [ 750.258691] ? iterate_fd+0x360/0x360 [ 750.262502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 750.268051] ? fput+0x128/0x1a0 [ 750.271336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.276887] ? security_file_ioctl+0x93/0xc0 [ 750.281301] ksys_ioctl+0xab/0xd0 [ 750.284760] __x64_sys_ioctl+0x73/0xb0 [ 750.288652] do_syscall_64+0x103/0x610 [ 750.292540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.297731] RIP: 0033:0x457e39 [ 750.300922] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 750.319817] RSP: 002b:00007ff3fd526c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 750.327525] RAX: ffffffffffffffda RBX: 00007ff3fd526c90 RCX: 0000000000457e39 [ 750.334789] RDX: 0000000020000140 RSI: 00000000c1105517 RDI: 0000000000000004 [ 750.342049] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 750.349317] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3fd5276d4 00:56:46 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000001903bc00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 750.356587] R13: 00000000004ca390 R14: 00000000004d3e78 R15: 0000000000000005 00:56:46 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000070100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:46 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) accept4$rose(r2, &(0x7f0000000080)=@full={0xb, @remote, @bcast, 0x0, [@netrom, @null, @remote, @netrom, @remote, @bcast]}, &(0x7f00000000c0)=0x40, 0x800) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x800000000000012, &(0x7f0000000400)=0x3fc, 0x90) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:46 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000001903cf00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 750.413804] EXT4-fs (loop0): Invalid log block size: 64 00:56:46 executing program 5 (fault-call:3 fault-nth:1): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:46 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019002d00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:46 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 750.514519] EXT4-fs (loop4): Invalid log block size: 64 00:56:46 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000090100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 750.589239] FAULT_INJECTION: forcing a failure. [ 750.589239] name failslab, interval 1, probability 0, space 0, times 0 [ 750.621136] EXT4-fs (loop1): Invalid log block size: 64 [ 750.649436] CPU: 0 PID: 4536 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 750.656467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.665816] Call Trace: [ 750.668411] dump_stack+0x172/0x1f0 [ 750.672053] should_fail.cold+0xa/0x1b [ 750.675943] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 750.681044] ? lock_downgrade+0x810/0x810 [ 750.685204] ? ___might_sleep+0x163/0x280 [ 750.689357] __should_failslab+0x121/0x190 [ 750.693608] should_failslab+0x9/0x14 [ 750.697414] __kmalloc+0x2dc/0x740 [ 750.700960] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 750.705978] ? snd_ctl_new+0x151/0x1b0 [ 750.709866] ? snd_ctl_elem_add+0x58f/0x13e0 [ 750.714274] snd_ctl_elem_add+0x58f/0x13e0 [ 750.718517] ? snd_ctl_new1+0x6a0/0x6a0 [ 750.722490] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 750.728043] ? _copy_from_user+0xdd/0x150 [ 750.732198] snd_ctl_elem_add_user+0xc6/0x180 [ 750.736694] ? snd_ctl_elem_add_compat+0x3f0/0x3f0 [ 750.741681] ? mark_held_locks+0x100/0x100 00:56:46 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x0, 0x100000001}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000240)={r4, 0xeb, "627019a7ee4a83630bac28ea2aef1ff1c76dbcd252623fbc89e024bebf16933d0be2e9b247a9bca009b7d7edfe73f2d0317aa3c7947d1626b8c769a9733aa42a222aa5a8b773baa32a2a5160348efb3be34ec4377aab2551672c91779b3fa777cc3cdea13cc422dfadde4a1bc29f9f6028cd7042e6e879a368ac9cfcfb634a375590c588a05b2a919a21f98f9921742fdf7a3456d741e4aefcb541b7478761659272d149465cd373c25251ac9bec1e40ff03527e51652776d9aaa6f130f81726a1b9878614ec202c522cb4233108401b316c5687b3aa4b3a5c35ed1979f5f4dc9fe77020cf12fcda4015f2"}, &(0x7f0000000180)=0xf3) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) [ 750.745922] ? proc_fail_nth_write+0x9d/0x1e0 [ 750.750435] snd_ctl_ioctl+0x937/0xf50 [ 750.754335] ? snd_ctl_elem_add_user+0x180/0x180 [ 750.759250] ? __fget+0x340/0x540 [ 750.762719] ? ___might_sleep+0x163/0x280 [ 750.766899] ? __might_sleep+0x95/0x190 [ 750.770884] ? snd_ctl_elem_add_user+0x180/0x180 [ 750.775679] do_vfs_ioctl+0xd6e/0x1390 [ 750.779571] ? selinux_file_ioctl+0x46f/0x5e0 [ 750.784066] ? selinux_file_ioctl+0x125/0x5e0 [ 750.788578] ? ioctl_preallocate+0x210/0x210 [ 750.792991] ? selinux_file_mprotect+0x620/0x620 [ 750.797770] ? iterate_fd+0x360/0x360 [ 750.801571] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 750.807137] ? fput+0x128/0x1a0 [ 750.810446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.816003] ? security_file_ioctl+0x93/0xc0 [ 750.820415] ksys_ioctl+0xab/0xd0 [ 750.823902] __x64_sys_ioctl+0x73/0xb0 [ 750.827806] do_syscall_64+0x103/0x610 [ 750.831701] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.836888] RIP: 0033:0x457e39 [ 750.840083] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 750.858980] RSP: 002b:00007ff3fd526c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 750.866685] RAX: ffffffffffffffda RBX: 00007ff3fd526c90 RCX: 0000000000457e39 [ 750.873955] RDX: 0000000020000140 RSI: 00000000c1105517 RDI: 0000000000000004 [ 750.881230] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 750.888493] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3fd5276d4 00:56:47 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019003f00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:47 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000001903d000e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 750.895770] R13: 00000000004ca390 R14: 00000000004d3e78 R15: 0000000000000005 00:56:47 executing program 5 (fault-call:3 fault-nth:2): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 750.942855] EXT4-fs (loop4): Invalid log block size: 64 00:56:47 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000001903d000e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) poll(&(0x7f0000000080)=[{r2, 0x1}, {r1, 0x20}, {r2, 0x30}, {r0, 0x1120}, {r0, 0x8}], 0x5, 0x1) 00:56:47 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000a0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 751.074879] EXT4-fs (loop1): Invalid log block size: 64 [ 751.101141] EXT4-fs (loop0): Invalid log block size: 64 00:56:47 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 751.124437] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:47 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000001900f900e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:47 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000197fff00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0xc0000, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f00000004c0)=""/244) close(r0) r2 = socket(0x20000000000000d, 0x0, 0xfffffbfffffffffe) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x40, 0x0) write$P9_RREAD(r4, &(0x7f0000000240)={0xcf, 0x75, 0x2, {0xc4, "2dd75f62850c12e9f22db97ad1396c88bfa67fe861f785924603c87a6bbecf1449403c7506a7d9779ff6324dede6d3a320f85535fa1dc077fa2b5666f57ed28eb92e513a718bd56f96c3d56930dae7ce50c6b8f078887cdcb753765876c0ca813587f4030eac74544c6b870db236a02dbbd5db06fa6236fff4a8af4952d4773277cdf1c792830eda473807e3929f96afa132a853c05c151a9e4f49357937dfbbc7318278d7265b1ade6eeef29e0952c35fdaeee3d1ed3d2ee77f029e11b1e0b264f473c8"}}, 0xcf) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r6, 0x800, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x16a9e25ab2dffd29}, 0x40010) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) r7 = semget(0x1, 0x0, 0x43) semctl$SEM_STAT(r7, 0x4, 0x12, &(0x7f0000000080)=""/68) [ 751.220210] EXT4-fs (loop4): Invalid log block size: 64 [ 751.240524] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 00:56:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x2, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:47 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000b0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 751.307648] EXT4-fs (loop0): Invalid log block size: 64 [ 751.313588] EXT4-fs (loop1): Invalid log block size: 64 00:56:47 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000000001000000197fff00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r2}, 0x10) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:47 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000200e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:47 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7ffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x4b47, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 751.508851] EXT4-fs (loop4): Invalid log block size: 64 [ 751.508910] EXT4-fs (loop0): Invalid log block size: 64 [ 751.524437] EXT4-fs (loop1): Invalid log block size: 64 00:56:47 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80001a0f0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) ioprio_set$pid(0x3, r4, 0x6) 00:56:47 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000400e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:47 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000200e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x4b49, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 751.701485] EXT4-fs (loop4): Invalid log block size: 64 00:56:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket(0x200000000000011, 0x803, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000140)=0x40) r4 = gettid() capget(&(0x7f0000000040)={0x20071026, r4}, &(0x7f0000000080)={0x1, 0xdf, 0xffff, 0x0, 0x5}) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) r5 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x10001, 0x60900) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r1) 00:56:48 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800004100100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x541b, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:48 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="650000000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 751.827694] EXT4-fs (loop1): Invalid log block size: 64 00:56:48 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000500e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000400e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x5421, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x10) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) recvmsg(r1, &(0x7f00000001c0)={&(0x7f00000000c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000140)=""/45, 0x2d}, {&(0x7f0000000180)=""/40, 0x28}, {&(0x7f0000000240)=""/191, 0xbf}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000300)=""/187, 0xbb}, {&(0x7f00000014c0)=""/157, 0x9d}, {&(0x7f0000001580)=""/65, 0x41}], 0x7, &(0x7f0000001680)=""/234, 0xea}, 0x1) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000440)={0x2, &(0x7f00000003c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000001780)={r4, 0x3}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00', r3}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:48 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000700e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 751.941525] EXT4-fs (loop4): Invalid log block size: 64 [ 751.967849] EXT4-fs (loop3): Invalid log block size: 64 00:56:48 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800020100100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x5450, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 752.056213] EXT4-fs (loop0): Invalid log block size: 64 00:56:48 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000500e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 752.117517] EXT4-fs (loop3): Invalid log block size: 64 [ 752.141340] EXT4-fs (loop4): Invalid log block size: 64 00:56:48 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0x40) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000001c0)) close(r1) r2 = socket(0x200000000000011, 0x803, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000380)={0x2, 0x0, [0x80000001, 0xdb, 0x6, 0xb10, 0x3, 0x3f, 0x1000, 0xba4]}) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x1}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000500)={r4, 0x4, 0x30, 0x3, 0xb0}, &(0x7f0000000540)=0x18) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x7ae, 0x0, 0xfffffffffffff801, 0x6}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000140)={r5, 0x1}, 0x8) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r2, &(0x7f0000000180)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800200}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x6c, r7, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1000}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8004}, 0x80) write(r1, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:48 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000240000000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 752.170263] EXT4-fs (loop1): Invalid log block size: 64 00:56:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x5451, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:48 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000f1a0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000700e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x5452, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:48 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000a00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x5460, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 752.349807] EXT4-fs (loop4): Invalid log block size: 64 [ 752.364920] EXT4-fs (loop3): Invalid log block size: 64 [ 752.386255] EXT4-fs (loop0): Invalid log block size: 64 00:56:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) sync() write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x84800) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x40, 0x1ff, 0x0, 0x0, 0x9, 0x0, "bb0c7fc1bebc9b3a2c757d111ade642f41f14b6165de9930dfd0b55124269e38827b0b0ba7896b3521a519abe9d1b9069ad566303aa0abf398402322f43df509", "b4be8ad29abff56c2c7f8d8275d5e06284c7a8e89f14f2902d139972d1d57a4e17c176c7d8b3fbfba59b9b0f6cc0342def7205b10d5bb09bb00dcc345acd8f0d", "01da21288c3ef93debf64109abee0c2f01ea92f536acdde6e7c5d63b06bd398b", [0xfffffffffffffffa, 0x5]}) 00:56:48 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="8000001f0100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019000a00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x40049409, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 752.516263] EXT4-fs (loop1): Invalid log block size: 64 [ 752.537874] EXT4-fs (loop3): Invalid log block size: 64 00:56:48 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019001000e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800200000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019001000e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:48 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000200100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 752.651135] EXT4-fs (loop4): Invalid log block size: 64 [ 752.665617] EXT4-fs (loop0): Invalid log block size: 64 00:56:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x40086602, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:49 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019001400e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:49 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x2001a, r3, 0x1, 0x4, 0x6, @dev}, 0x266) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x40087602, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:49 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019001400e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 752.787961] EXT4-fs (loop1): Invalid log block size: 64 [ 752.859179] EXT4-fs (loop4): Invalid log block size: 64 [ 752.864716] EXT4-fs (loop3): Invalid log block size: 64 [ 752.878719] EXT4-fs (loop0): Invalid log block size: 64 00:56:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x4020940d, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:56:49 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000000100000019002d00e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 00:56:49 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000000000011, 0x803, 0x10) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) recvmsg(r1, &(0x7f00000001c0)={&(0x7f00000000c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000140)=""/45, 0x2d}, {&(0x7f0000000180)=""/40, 0x28}, {&(0x7f0000000240)=""/191, 0xbf}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000300)=""/187, 0xbb}, {&(0x7f00000014c0)=""/157, 0x9d}, {&(0x7f0000001580)=""/65, 0x41}], 0x7, &(0x7f0000001680)=""/234, 0xea}, 0x1) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000440)={0x2, &(0x7f00000003c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000001780)={r4, 0x3}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00', r3}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, &(0x7f0000000000)="e8833f8bc5418cb8aa89bd13daa6", 0xe) 00:56:49 executing program 4: syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800010200100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 753.027931] EXT4-fs (loop3): Invalid log block size: 64 [ 753.033417] EXT4-fs (loop1): Invalid log block size: 64 00:56:49 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800300000100000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 753.096348] ================================================================== [ 753.104098] BUG: KASAN: use-after-free in batadv_interface_tx+0xa24/0x1470 [ 753.111113] Read of size 2 at addr ffff8880a42f980b by task syz-executor2/4785 [ 753.118574] [ 753.120195] CPU: 1 PID: 4785 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60 [ 753.127186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.136519] Call Trace: [ 753.139103] dump_stack+0x172/0x1f0 [ 753.142726] ? batadv_interface_tx+0xa24/0x1470 [ 753.147399] print_address_description.cold+0x7c/0x20d [ 753.152672] ? batadv_interface_tx+0xa24/0x1470 [ 753.157329] ? batadv_interface_tx+0xa24/0x1470 [ 753.161989] kasan_report.cold+0x1b/0x40 [ 753.166034] ? batadv_interface_tx+0xa24/0x1470 [ 753.170701] __asan_report_load_n_noabort+0xf/0x20 [ 753.175623] batadv_interface_tx+0xa24/0x1470 [ 753.180103] ? batadv_skb_head_push+0x2b0/0x2b0 [ 753.184785] ? validate_xmit_skb+0x7ab/0xdd0 [ 753.189199] ? dev_direct_xmit+0x204/0x640 [ 753.193421] dev_direct_xmit+0x346/0x640 [ 753.197480] ? validate_xmit_skb_list+0x150/0x150 [ 753.202307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.207842] ? skb_copy_datagram_from_iter+0x435/0x660 [ 753.213120] packet_direct_xmit+0xfb/0x170 [ 753.217362] packet_sendmsg+0x3879/0x5ab0 [ 753.221519] ? __might_sleep+0x95/0x190 [ 753.225495] ? packet_getname+0x5f0/0x5f0 [ 753.229637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.235178] ? selinux_socket_sendmsg+0x36/0x40 [ 753.239839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.245377] ? security_socket_sendmsg+0x93/0xc0 [ 753.250116] ? packet_getname+0x5f0/0x5f0 [ 753.254250] sock_sendmsg+0xdd/0x130 [ 753.257966] sock_write_iter+0x27c/0x3e0 [ 753.262052] ? sock_sendmsg+0x130/0x130 [ 753.266017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.271541] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 753.277060] ? iov_iter_init+0xea/0x220 [ 753.281024] __vfs_write+0x613/0x8e0 [ 753.284723] ? kernel_read+0x120/0x120 [ 753.288604] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 753.294159] ? rw_verify_area+0x118/0x360 [ 753.298291] vfs_write+0x20c/0x580 [ 753.301817] ksys_write+0xea/0x1f0 [ 753.305356] ? __ia32_sys_read+0xb0/0xb0 [ 753.309409] ? do_syscall_64+0x26/0x610 [ 753.313366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.318710] ? do_syscall_64+0x26/0x610 [ 753.322671] __x64_sys_write+0x73/0xb0 [ 753.326541] do_syscall_64+0x103/0x610 [ 753.330411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.335581] RIP: 0033:0x457e39 [ 753.338760] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 753.357645] RSP: 002b:00007fa237154c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 753.365340] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 753.372602] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000003 [ 753.379858] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 753.387118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2371556d4 00:56:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x40405514, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 753.394377] R13: 00000000004c3b8d R14: 00000000004dc278 R15: 00000000ffffffff [ 753.401645] [ 753.403259] Allocated by task 4450: [ 753.406871] save_stack+0x45/0xd0 [ 753.410306] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 753.415216] kasan_slab_alloc+0xf/0x20 [ 753.419086] kmem_cache_alloc+0x12d/0x710 [ 753.423545] getname_kernel+0x53/0x370 [ 753.427440] kern_path+0x20/0x40 [ 753.430832] lookup_bdev.part.0+0x7b/0x1b0 [ 753.435059] blkdev_get_by_path+0x81/0x130 [ 753.439285] mount_bdev+0x5d/0x3c0 [ 753.442813] ext4_mount+0x35/0x40 [ 753.446246] mount_fs+0x106/0x3ff [ 753.449687] vfs_kern_mount.part.0+0x6f/0x410 [ 753.454171] do_mount+0x581/0x2d30 [ 753.457690] ksys_mount+0xdb/0x150 [ 753.461213] __x64_sys_mount+0xbe/0x150 [ 753.465168] do_syscall_64+0x103/0x610 [ 753.469041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.474204] [ 753.475813] Freed by task 4450: [ 753.479089] save_stack+0x45/0xd0 [ 753.482531] __kasan_slab_free+0x102/0x150 [ 753.486747] kasan_slab_free+0xe/0x10 [ 753.490535] kmem_cache_free+0x86/0x260 [ 753.494504] putname+0xef/0x130 [ 753.497777] filename_lookup+0x28f/0x410 [ 753.501818] kern_path+0x36/0x40 [ 753.505180] lookup_bdev.part.0+0x7b/0x1b0 [ 753.509395] blkdev_get_by_path+0x81/0x130 [ 753.513627] mount_bdev+0x5d/0x3c0 [ 753.517150] ext4_mount+0x35/0x40 [ 753.520583] mount_fs+0x106/0x3ff [ 753.524015] vfs_kern_mount.part.0+0x6f/0x410 [ 753.528525] do_mount+0x581/0x2d30 [ 753.532055] ksys_mount+0xdb/0x150 [ 753.535585] __x64_sys_mount+0xbe/0x150 [ 753.539557] do_syscall_64+0x103/0x610 [ 753.543434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.548604] [ 753.550233] The buggy address belongs to the object at ffff8880a42f8d00 [ 753.550233] which belongs to the cache names_cache of size 4096 [ 753.563227] The buggy address is located 2827 bytes inside of [ 753.563227] 4096-byte region [ffff8880a42f8d00, ffff8880a42f9d00) [ 753.575374] The buggy address belongs to the page: [ 753.580304] page:ffffea000290be00 count:1 mapcount:0 mapping:ffff88821bc45b00 index:0x0 compound_mapcount: 0 [ 753.590252] flags: 0x1fffc0000010200(slab|head) [ 753.594913] raw: 01fffc0000010200 ffffea0002371c88 ffffea00022e4f08 ffff88821bc45b00 [ 753.602790] raw: 0000000000000000 ffff8880a42f8d00 0000000100000001 0000000000000000 [ 753.610646] page dumped because: kasan: bad access detected [ 753.616332] [ 753.617943] Memory state around the buggy address: [ 753.622851] ffff8880a42f9700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 753.630211] ffff8880a42f9780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 753.637570] >ffff8880a42f9800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 753.644992] ^ [ 753.648613] ffff8880a42f9880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 753.655955] ffff8880a42f9900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 753.663289] ================================================================== [ 753.670653] Disabling lock debugging due to kernel taint [ 753.676156] Kernel panic - not syncing: panic_on_warn set ... [ 753.682994] CPU: 1 PID: 4785 Comm: syz-executor2 Tainted: G B 5.0.0-rc5 #60 [ 753.691410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.700759] Call Trace: [ 753.703349] dump_stack+0x172/0x1f0 [ 753.706978] panic+0x2cb/0x65c [ 753.710172] ? __warn_printk+0xf3/0xf3 [ 753.714054] ? retint_kernel+0x2d/0x2d [ 753.717950] ? trace_hardirqs_on+0x5e/0x230 [ 753.722273] ? batadv_interface_tx+0xa24/0x1470 [ 753.726946] end_report+0x47/0x4f [ 753.730395] ? batadv_interface_tx+0xa24/0x1470 [ 753.735075] kasan_report.cold+0xe/0x40 [ 753.739045] ? batadv_interface_tx+0xa24/0x1470 [ 753.743723] __asan_report_load_n_noabort+0xf/0x20 [ 753.748680] batadv_interface_tx+0xa24/0x1470 [ 753.753179] ? batadv_skb_head_push+0x2b0/0x2b0 [ 753.757846] ? validate_xmit_skb+0x7ab/0xdd0 [ 753.762255] ? dev_direct_xmit+0x204/0x640 [ 753.766491] dev_direct_xmit+0x346/0x640 [ 753.770556] ? validate_xmit_skb_list+0x150/0x150 [ 753.775396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.780964] ? skb_copy_datagram_from_iter+0x435/0x660 [ 753.786243] packet_direct_xmit+0xfb/0x170 [ 753.790583] packet_sendmsg+0x3879/0x5ab0 [ 753.794731] ? __might_sleep+0x95/0x190 00:56:50 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="80000000010000001900f900e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 753.798711] ? packet_getname+0x5f0/0x5f0 [ 753.802861] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.808399] ? selinux_socket_sendmsg+0x36/0x40 [ 753.813063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.818598] ? security_socket_sendmsg+0x93/0xc0 [ 753.823350] ? packet_getname+0x5f0/0x5f0 [ 753.827512] sock_sendmsg+0xdd/0x130 [ 753.831222] sock_write_iter+0x27c/0x3e0 [ 753.835279] ? sock_sendmsg+0x130/0x130 [ 753.839249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.844791] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 753.850330] ? iov_iter_init+0xea/0x220 [ 753.854306] __vfs_write+0x613/0x8e0 [ 753.858022] ? kernel_read+0x120/0x120 [ 753.861913] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 753.867457] ? rw_verify_area+0x118/0x360 [ 753.871601] vfs_write+0x20c/0x580 [ 753.875139] ksys_write+0xea/0x1f0 [ 753.878689] ? __ia32_sys_read+0xb0/0xb0 [ 753.882745] ? do_syscall_64+0x26/0x610 [ 753.886717] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.892074] ? do_syscall_64+0x26/0x610 [ 753.896043] __x64_sys_write+0x73/0xb0 [ 753.899934] do_syscall_64+0x103/0x610 [ 753.903824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.909091] RIP: 0033:0x457e39 [ 753.912285] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 753.931179] RSP: 002b:00007fa237154c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 753.938884] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 753.946165] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000003 [ 753.953429] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 753.960693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2371556d4 [ 753.967956] R13: 00000000004c3b8d R14: 00000000004dc278 R15: 00000000ffffffff [ 753.976573] Kernel Offset: disabled [ 753.980194] Rebooting in 86400 seconds..