dummy_encryption'}]}) 10:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x82000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 664.283117][T13068] loop3: detected capacity change from 512 to 0 [ 664.343107][T13090] loop4: detected capacity change from 512 to 0 [ 664.376491][T13055] EXT4-fs (loop5): Test dummy encryption mode enabled [ 664.383844][T13068] EXT4-fs (loop3): Test dummy encryption mode enabled [ 664.391144][T13076] EXT4-fs (loop0): Test dummy encryption mode enabled [ 664.419104][T13090] EXT4-fs (loop4): Test dummy encryption mode enabled [ 664.431746][T13090] EXT4-fs (loop4): inodes count not valid: 1114144 vs 32 [ 664.449691][T13076] EXT4-fs (loop0): inodes count not valid: 2046820384 vs 32 [ 664.459683][T13068] EXT4-fs (loop3): inodes count not valid: 983072 vs 32 10:57:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20c700004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 664.467708][T13055] EXT4-fs (loop5): inodes count not valid: 50720 vs 32 10:57:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200410004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 664.576434][T13096] loop2: detected capacity change from 512 to 0 [ 664.591806][T13097] loop1: detected capacity change from 264192 to 0 [ 664.656415][T13096] EXT4-fs (loop2): Test dummy encryption mode enabled [ 664.663677][T13096] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 664.687659][T13096] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 664.700051][T13096] EXT4-fs (loop2): get root inode failed 10:57:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200012004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 664.705768][T13096] EXT4-fs (loop2): mount failed [ 664.726358][T13097] EXT4-fs (loop1): Test dummy encryption mode enabled 10:57:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000005000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000007d4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 664.775922][T13097] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 664.817012][T13116] loop4: detected capacity change from 512 to 0 [ 664.830875][T13112] loop3: detected capacity change from 512 to 0 [ 664.842811][T13114] loop5: detected capacity change from 512 to 0 10:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4a503, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 664.865556][T13116] EXT4-fs (loop4): Test dummy encryption mode enabled [ 664.872865][T13112] EXT4-fs (loop3): Test dummy encryption mode enabled [ 664.890507][T13114] EXT4-fs (loop5): Test dummy encryption mode enabled [ 664.899039][T13126] loop0: detected capacity change from 512 to 0 [ 664.907837][T13112] EXT4-fs (loop3): inodes count not valid: 1049632 vs 32 [ 664.919190][T13128] loop2: detected capacity change from 512 to 0 [ 664.923528][T13114] EXT4-fs (loop5): inodes count not valid: 50976 vs 32 [ 664.932677][T13116] EXT4-fs (loop4): inodes count not valid: 1179680 vs 32 [ 665.026956][T13128] EXT4-fs (loop2): Test dummy encryption mode enabled [ 665.035676][T13128] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 665.057346][T13128] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 665.071153][T13128] EXT4-fs (loop2): get root inode failed [ 665.076879][T13128] EXT4-fs (loop2): mount failed [ 665.099711][T13126] EXT4-fs (loop0): Test dummy encryption mode enabled [ 665.110828][T13114] loop5: detected capacity change from 512 to 0 [ 665.120668][T13126] EXT4-fs (loop0): inodes count not valid: 2097152032 vs 32 [ 665.133358][T13112] loop3: detected capacity change from 512 to 0 10:57:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000006000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 665.156218][T13114] EXT4-fs (loop5): Test dummy encryption mode enabled [ 665.169677][T13116] loop4: detected capacity change from 512 to 0 [ 665.182198][T13114] EXT4-fs (loop5): inodes count not valid: 50976 vs 32 10:57:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000007e4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 665.257150][T13112] EXT4-fs (loop3): Test dummy encryption mode enabled [ 665.264282][T13112] EXT4-fs (loop3): inodes count not valid: 1049632 vs 32 [ 665.281774][T13148] loop1: detected capacity change from 594 to 0 [ 665.307619][T13116] EXT4-fs (loop4): Test dummy encryption mode enabled [ 665.318564][T13116] EXT4-fs (loop4): inodes count not valid: 1179680 vs 32 10:57:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="202010004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20c800004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 665.353252][T13156] loop2: detected capacity change from 512 to 0 [ 665.368103][T13148] EXT4-fs (loop1): Test dummy encryption mode enabled [ 665.393696][T13160] loop0: detected capacity change from 512 to 0 [ 665.396089][T13148] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200018004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 665.537085][T13156] EXT4-fs (loop2): Test dummy encryption mode enabled [ 665.544222][T13160] EXT4-fs (loop0): Test dummy encryption mode enabled [ 665.555024][T13156] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 665.571169][T13160] EXT4-fs (loop0): inodes count not valid: 2113929248 vs 32 10:57:37 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)="6610a8b9e551574d500b50830fa10f100fc4", 0x12}], 0x1}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)=0x1) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) [ 665.581808][T13156] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 665.599252][T13156] EXT4-fs (loop2): get root inode failed [ 665.605655][T13156] EXT4-fs (loop2): mount failed [ 665.806669][T13166] loop5: detected capacity change from 512 to 0 [ 665.846864][T13166] EXT4-fs (loop5): Test dummy encryption mode enabled 10:57:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000894000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000007000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 665.949758][T13166] EXT4-fs (loop5): inodes count not valid: 51232 vs 32 [ 665.971161][T13183] loop3: detected capacity change from 512 to 0 10:57:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20c900004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 666.007997][T13185] loop4: detected capacity change from 512 to 0 [ 666.047141][T13183] EXT4-fs (loop3): Test dummy encryption mode enabled [ 666.083728][T13183] EXT4-fs (loop3): inodes count not valid: 1056800 vs 32 [ 666.107205][T13190] loop0: detected capacity change from 512 to 0 [ 666.114640][T13185] EXT4-fs (loop4): Test dummy encryption mode enabled [ 666.127671][T13198] loop1: detected capacity change from 264192 to 0 [ 666.134587][T13185] EXT4-fs (loop4): inodes count not valid: 1572896 vs 32 [ 666.141478][T13199] loop2: detected capacity change from 512 to 0 [ 666.156426][T13190] EXT4-fs (loop0): Test dummy encryption mode enabled [ 666.167463][T13190] EXT4-fs (loop0): inodes count not valid: 2298478624 vs 32 [ 666.197788][T13198] EXT4-fs (loop1): Test dummy encryption mode enabled [ 666.210852][T13198] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 666.236630][T13208] loop5: detected capacity change from 512 to 0 [ 666.243846][T13199] EXT4-fs (loop2): Test dummy encryption mode enabled [ 666.258148][T13199] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 666.273653][T13199] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 666.290335][T13199] EXT4-fs (loop2): get root inode failed 10:57:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x44800, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000005e00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200021004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 666.294684][T13185] loop4: detected capacity change from 512 to 0 [ 666.303867][T13199] EXT4-fs (loop2): mount failed [ 666.313226][T13208] EXT4-fs (loop5): Test dummy encryption mode enabled [ 666.323283][T13208] EXT4-fs (loop5): inodes count not valid: 51488 vs 32 10:57:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200011004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000008000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 666.516687][T13224] loop0: detected capacity change from 512 to 0 [ 666.524946][T13224] EXT4-fs (loop0): Test dummy encryption mode enabled [ 666.544846][T13208] loop5: detected capacity change from 512 to 0 [ 666.551480][T13224] EXT4-fs (loop0): bad geometry: block count 94 exceeds size of device (64 blocks) [ 666.571294][T13208] EXT4-fs (loop5): Test dummy encryption mode enabled [ 666.598211][T13239] loop4: detected capacity change from 512 to 0 [ 666.606629][T13208] EXT4-fs (loop5): inodes count not valid: 51488 vs 32 [ 666.611548][T13234] loop2: detected capacity change from 512 to 0 [ 666.628906][T13238] loop1: detected capacity change from 548 to 0 [ 666.638698][T13241] loop3: detected capacity change from 512 to 0 [ 666.696210][T13239] EXT4-fs (loop4): Test dummy encryption mode enabled [ 666.709813][T13238] EXT4-fs (loop1): Test dummy encryption mode enabled [ 666.718318][T13234] EXT4-fs (loop2): Test dummy encryption mode enabled [ 666.722737][T13241] EXT4-fs (loop3): Test dummy encryption mode enabled 10:57:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20ca00004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 666.746971][T13239] EXT4-fs (loop4): inodes count not valid: 2162720 vs 32 [ 666.754982][T13238] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 666.780632][T13241] EXT4-fs (loop3): inodes count not valid: 1114144 vs 32 10:57:38 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)="6610a8b9e551574d500b50830fa10f100fc4", 0x12}], 0x1}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)=0x1) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 10:57:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200012004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006f00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 666.789028][T13234] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 666.834055][T13239] loop4: detected capacity change from 512 to 0 [ 666.877020][T13234] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 666.877867][T13239] EXT4-fs (loop4): Test dummy encryption mode enabled [ 666.902106][T13257] loop5: detected capacity change from 512 to 0 [ 666.911452][T13234] EXT4-fs (loop2): get root inode failed [ 666.918560][T13234] EXT4-fs (loop2): mount failed [ 666.924977][T13239] EXT4-fs (loop4): inodes count not valid: 2162720 vs 32 10:57:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000009000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200025004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 667.027839][T13257] EXT4-fs (loop5): Test dummy encryption mode enabled [ 667.041944][T13257] EXT4-fs (loop5): inodes count not valid: 51744 vs 32 10:57:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43c01, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 667.216672][T13280] loop4: detected capacity change from 512 to 0 [ 667.224323][T13273] loop0: detected capacity change from 512 to 0 [ 667.239647][T13274] loop3: detected capacity change from 512 to 0 [ 667.258718][T13274] EXT4-fs (loop3): Test dummy encryption mode enabled [ 667.259173][T13279] loop2: detected capacity change from 512 to 0 [ 667.274179][T13274] EXT4-fs (loop3): inodes count not valid: 1179680 vs 32 [ 667.284127][T13280] EXT4-fs (loop4): Test dummy encryption mode enabled [ 667.294873][T13280] EXT4-fs (loop4): inodes count not valid: 2424864 vs 32 [ 667.304180][T13287] loop1: detected capacity change from 542 to 0 10:57:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="201501004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 667.311809][T13279] EXT4-fs (loop2): Test dummy encryption mode enabled [ 667.312255][T13273] EXT4-fs (loop0): Test dummy encryption mode enabled [ 667.326858][T13279] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 667.341646][T13257] loop5: detected capacity change from 512 to 0 10:57:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="206b14004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20002e004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 667.397861][T13273] EXT4-fs (loop0): bad geometry: block count 111 exceeds size of device (64 blocks) [ 667.400221][T13287] EXT4-fs (loop1): Test dummy encryption mode enabled [ 667.415308][T13279] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated 10:57:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007c00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 667.443756][T13287] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 667.456411][T13279] EXT4-fs (loop2): get root inode failed [ 667.463782][T13279] EXT4-fs (loop2): mount failed 10:57:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x12, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 667.618202][T13305] loop3: detected capacity change from 512 to 0 [ 667.643642][T13301] loop5: detected capacity change from 512 to 0 10:57:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000a000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 667.692655][T13301] EXT4-fs (loop5): Test dummy encryption mode enabled [ 667.693581][T13305] EXT4-fs (loop3): Test dummy encryption mode enabled [ 667.710287][T13301] EXT4-fs (loop5): inodes count not valid: 70944 vs 32 [ 667.729198][T13305] EXT4-fs (loop3): inodes count not valid: 1338144 vs 32 [ 667.751571][T13315] loop4: detected capacity change from 512 to 0 [ 667.798887][T13321] loop0: detected capacity change from 512 to 0 [ 667.836857][T13315] EXT4-fs (loop4): Test dummy encryption mode enabled [ 667.843945][T13315] EXT4-fs (loop4): inodes count not valid: 3014688 vs 32 [ 667.857762][T13301] loop5: detected capacity change from 512 to 0 [ 667.886872][T13328] loop2: detected capacity change from 512 to 0 [ 667.893689][T13321] EXT4-fs (loop0): Test dummy encryption mode enabled [ 667.918356][T13321] EXT4-fs (loop0): bad geometry: block count 124 exceeds size of device (64 blocks) [ 667.931284][T13305] loop3: detected capacity change from 512 to 0 [ 667.939989][T13301] EXT4-fs (loop5): Test dummy encryption mode enabled [ 667.940067][T13305] EXT4-fs (loop3): Test dummy encryption mode enabled 10:57:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007f00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 667.971550][T13301] EXT4-fs (loop5): inodes count not valid: 70944 vs 32 [ 667.983570][T13305] EXT4-fs (loop3): inodes count not valid: 1338144 vs 32 [ 668.006621][T13336] loop1: detected capacity change from 512 to 0 10:57:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="203c01004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 668.015380][T13336] EXT4-fs (loop1): Test dummy encryption mode enabled [ 668.029214][T13328] EXT4-fs (loop2): Test dummy encryption mode enabled [ 668.038910][T13328] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 668.046195][T13336] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200032004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 668.068514][T13328] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 668.095338][T13328] EXT4-fs (loop2): get root inode failed 10:57:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200115004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 668.132416][T13328] EXT4-fs (loop2): mount failed 10:57:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000b000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 668.289766][T13351] loop5: detected capacity change from 512 to 0 [ 668.300037][T13351] EXT4-fs (loop5): Test dummy encryption mode enabled [ 668.309428][T13351] EXT4-fs (loop5): inodes count not valid: 80928 vs 32 [ 668.318279][T13350] loop0: detected capacity change from 512 to 0 [ 668.352907][T13350] EXT4-fs (loop0): Test dummy encryption mode enabled [ 668.360476][T13354] loop4: detected capacity change from 512 to 0 [ 668.375585][T13350] EXT4-fs (loop0): bad geometry: block count 127 exceeds size of device (64 blocks) [ 668.422445][T13369] loop1: detected capacity change from 512 to 0 [ 668.476424][T13357] loop3: detected capacity change from 512 to 0 [ 668.484002][T13351] loop5: detected capacity change from 512 to 0 [ 668.484065][T13354] EXT4-fs (loop4): Test dummy encryption mode enabled [ 668.500905][T13354] EXT4-fs (loop4): inodes count not valid: 3276832 vs 32 [ 668.511649][T13373] loop2: detected capacity change from 512 to 0 10:57:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000c000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 668.520446][T13373] EXT4-fs (loop2): Test dummy encryption mode enabled [ 668.528606][T13357] EXT4-fs (loop3): Test dummy encryption mode enabled [ 668.536930][T13369] EXT4-fs (loop1): Test dummy encryption mode enabled [ 668.537325][T13351] EXT4-fs (loop5): Test dummy encryption mode enabled [ 668.550682][T13351] EXT4-fs (loop5): inodes count not valid: 80928 vs 32 [ 668.563701][T13357] EXT4-fs (loop3): inodes count not valid: 1376544 vs 32 [ 668.577057][T13373] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 668.596062][T13369] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="204101004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 668.627088][T13373] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 668.639637][T13373] EXT4-fs (loop2): get root inode failed [ 668.645256][T13373] EXT4-fs (loop2): mount failed 10:57:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200018004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x415a6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000c000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 668.728134][T13354] loop4: detected capacity change from 512 to 0 [ 668.849183][T13354] EXT4-fs (loop4): Test dummy encryption mode enabled [ 668.853725][T13391] loop0: detected capacity change from 512 to 0 [ 668.856184][T13354] EXT4-fs (loop4): inodes count not valid: 3276832 vs 32 [ 668.865304][T13397] loop5: detected capacity change from 512 to 0 [ 668.892441][T13397] EXT4-fs (loop5): Test dummy encryption mode enabled [ 668.899802][T13397] EXT4-fs (loop5): inodes count not valid: 82208 vs 32 [ 668.900376][T13391] EXT4-fs (loop0): Test dummy encryption mode enabled [ 668.950877][T13391] EXT4-fs (loop0): bad geometry: block count 192 exceeds size of device (64 blocks) 10:57:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200048004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 669.046574][T13410] loop3: detected capacity change from 512 to 0 [ 669.073478][T13408] loop1: detected capacity change from 522 to 0 [ 669.096324][T13406] loop2: detected capacity change from 512 to 0 [ 669.106424][T13410] EXT4-fs (loop3): Test dummy encryption mode enabled [ 669.117739][T13397] loop5: detected capacity change from 512 to 0 [ 669.132788][T13408] EXT4-fs (loop1): Test dummy encryption mode enabled [ 669.143248][T13410] EXT4-fs (loop3): inodes count not valid: 1572896 vs 32 [ 669.159652][T13408] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 669.174953][T13406] EXT4-fs (loop2): Test dummy encryption mode enabled [ 669.182569][T13397] EXT4-fs (loop5): Test dummy encryption mode enabled 10:57:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000001f800000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 669.206604][T13397] EXT4-fs (loop5): inodes count not valid: 82208 vs 32 [ 669.206639][T13423] loop4: detected capacity change from 512 to 0 [ 669.228727][T13406] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 669.244334][T13406] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 669.256654][T13406] EXT4-fs (loop2): get root inode failed [ 669.262444][T13406] EXT4-fs (loop2): mount failed 10:57:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="206701004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 669.305973][T13423] EXT4-fs (loop4): Test dummy encryption mode enabled [ 669.332311][T13423] EXT4-fs (loop4): inodes count not valid: 4718624 vs 32 [ 669.344812][T13410] loop3: detected capacity change from 512 to 0 10:57:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20004c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 669.403720][T13410] EXT4-fs (loop3): Test dummy encryption mode enabled [ 669.417756][T13410] EXT4-fs (loop3): inodes count not valid: 1572896 vs 32 10:57:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20001c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 669.548222][T13434] loop0: detected capacity change from 512 to 0 [ 669.584543][T13438] loop5: detected capacity change from 512 to 0 10:57:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000d000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 669.593003][T13434] EXT4-fs (loop0): Test dummy encryption mode enabled [ 669.605879][T13434] EXT4-fs (loop0): bad geometry: block count 248 exceeds size of device (64 blocks) [ 669.619160][T13444] loop4: detected capacity change from 512 to 0 [ 669.630503][T13448] loop1: detected capacity change from 264192 to 0 [ 669.667905][T13438] EXT4-fs (loop5): Test dummy encryption mode enabled [ 669.674978][T13438] EXT4-fs (loop5): inodes count not valid: 91936 vs 32 [ 669.697022][T13444] EXT4-fs (loop4): Test dummy encryption mode enabled [ 669.704086][T13458] loop2: detected capacity change from 512 to 0 [ 669.710817][T13448] EXT4-fs (loop1): Test dummy encryption mode enabled 10:57:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080ffff0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 669.737773][T13444] EXT4-fs (loop4): inodes count not valid: 4980768 vs 32 [ 669.755568][T13457] loop3: detected capacity change from 512 to 0 [ 669.767897][T13448] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 669.827444][T13458] EXT4-fs (loop2): Test dummy encryption mode enabled [ 669.834785][T13458] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 669.854165][T13458] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 669.868320][T13458] EXT4-fs (loop2): get root inode failed [ 669.874053][T13458] EXT4-fs (loop2): mount failed 10:57:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 669.919453][T13457] EXT4-fs (loop3): Test dummy encryption mode enabled [ 669.934226][T13438] loop5: detected capacity change from 512 to 0 [ 669.956015][T13457] EXT4-fs (loop3): inodes count not valid: 1835040 vs 32 10:57:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000e000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 670.003082][T13444] loop4: detected capacity change from 512 to 0 [ 670.019166][T13438] EXT4-fs (loop5): Test dummy encryption mode enabled [ 670.032782][T13438] EXT4-fs (loop5): inodes count not valid: 91936 vs 32 [ 670.081995][T13444] EXT4-fs (loop4): Test dummy encryption mode enabled [ 670.089231][T13444] EXT4-fs (loop4): inodes count not valid: 4980768 vs 32 10:57:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20a201004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 670.137840][T13480] loop0: detected capacity change from 512 to 0 10:57:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20005c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 670.287201][T13486] loop2: detected capacity change from 512 to 0 10:57:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20011e004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 670.376002][T13480] EXT4-fs (loop0): Test dummy encryption mode enabled [ 670.383849][T13480] EXT4-fs (loop0): bad geometry: block count 16777088 exceeds size of device (64 blocks) [ 670.405891][T13486] EXT4-fs (loop2): Test dummy encryption mode enabled 10:57:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000a0ffff0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 670.461277][T13486] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 670.463560][T13499] loop1: detected capacity change from 264192 to 0 [ 670.514317][T13486] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 670.529572][T13499] EXT4-fs (loop1): Test dummy encryption mode enabled [ 670.531415][T13486] EXT4-fs (loop2): get root inode failed [ 670.536690][T13505] loop3: detected capacity change from 512 to 0 [ 670.548243][T13486] EXT4-fs (loop2): mount failed [ 670.554517][T13499] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 670.575892][T13504] loop4: detected capacity change from 512 to 0 [ 670.584320][T13506] loop5: detected capacity change from 512 to 0 [ 670.597248][T13513] loop0: detected capacity change from 512 to 0 [ 670.613701][T13505] EXT4-fs (loop3): Test dummy encryption mode enabled [ 670.621205][T13504] EXT4-fs (loop4): Test dummy encryption mode enabled [ 670.630352][T13506] EXT4-fs (loop5): Test dummy encryption mode enabled 10:57:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="206701004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 670.658747][T13505] EXT4-fs (loop3): inodes count not valid: 1966368 vs 32 [ 670.667546][T13504] EXT4-fs (loop4): inodes count not valid: 6029344 vs 32 [ 670.680562][T13513] EXT4-fs (loop0): Test dummy encryption mode enabled [ 670.691114][T13506] EXT4-fs (loop5): inodes count not valid: 107040 vs 32 10:57:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000f000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 670.715784][T13513] EXT4-fs (loop0): bad geometry: block count 16777120 exceeds size of device (64 blocks) 10:57:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200060004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 670.902628][T13505] loop3: detected capacity change from 512 to 0 10:57:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000200000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 670.965686][T13531] loop1: detected capacity change from 512 to 0 [ 670.990362][T13506] loop5: detected capacity change from 512 to 0 [ 671.007612][T13505] EXT4-fs (loop3): Test dummy encryption mode enabled [ 671.023186][T13534] loop2: detected capacity change from 512 to 0 [ 671.035165][T13531] EXT4-fs (loop1): Test dummy encryption mode enabled [ 671.047860][T13505] EXT4-fs (loop3): inodes count not valid: 1966368 vs 32 [ 671.057737][T13531] EXT4-fs (loop1): inodes count not valid: 91936 vs 32 [ 671.091242][T13536] loop4: detected capacity change from 512 to 0 [ 671.139376][T13506] EXT4-fs (loop5): Test dummy encryption mode enabled [ 671.146367][T13543] loop0: detected capacity change from 512 to 0 [ 671.167998][T13534] EXT4-fs (loop2): Test dummy encryption mode enabled 10:57:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20001f004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20005c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 671.188787][T13543] EXT4-fs (loop0): Test dummy encryption mode enabled [ 671.202383][T13536] EXT4-fs (loop4): Test dummy encryption mode enabled [ 671.210097][T13506] EXT4-fs (loop5): inodes count not valid: 107040 vs 32 [ 671.220853][T13534] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 671.239324][T13536] EXT4-fs (loop4): inodes count not valid: 6291488 vs 32 [ 671.247953][T13543] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 2)! [ 671.266890][T13543] EXT4-fs (loop0): group descriptors corrupted! [ 671.291115][T13534] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 671.303512][T13534] EXT4-fs (loop2): get root inode failed [ 671.309316][T13534] EXT4-fs (loop2): mount failed 10:57:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20b301004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000400000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000010000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 671.517539][T13553] loop3: detected capacity change from 512 to 0 [ 671.529662][T13558] loop1: detected capacity change from 512 to 0 [ 671.554951][T13536] loop4: detected capacity change from 512 to 0 [ 671.565064][T13553] EXT4-fs (loop3): Test dummy encryption mode enabled [ 671.573980][T13558] EXT4-fs (loop1): Test dummy encryption mode enabled [ 671.588512][T13536] EXT4-fs (loop4): Test dummy encryption mode enabled [ 671.595369][T13553] EXT4-fs (loop3): inodes count not valid: 2031648 vs 32 [ 671.610507][T13536] EXT4-fs (loop4): inodes count not valid: 6291488 vs 32 [ 671.617854][T13558] EXT4-fs (loop1): inodes count not valid: 6029344 vs 32 [ 671.636515][T13573] loop5: detected capacity change from 512 to 0 [ 671.647051][T13573] EXT4-fs (loop5): Test dummy encryption mode enabled [ 671.654463][T13573] EXT4-fs (loop5): inodes count not valid: 111392 vs 32 10:57:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200068004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 671.696413][T13575] loop2: detected capacity change from 512 to 0 10:57:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41100, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 671.786379][T13576] loop0: detected capacity change from 512 to 0 [ 671.793551][T13575] EXT4-fs (loop2): Test dummy encryption mode enabled [ 671.810289][T13575] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 671.840347][T13575] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 671.856629][T13575] EXT4-fs (loop2): get root inode failed [ 671.862386][T13575] EXT4-fs (loop2): mount failed 10:57:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20031f004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 671.903732][T13576] EXT4-fs (loop0): Test dummy encryption mode enabled [ 671.911137][T13576] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 4)! [ 671.934904][T13576] EXT4-fs (loop0): group descriptors corrupted! [ 671.950935][T13573] loop5: detected capacity change from 512 to 0 10:57:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000500000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 671.974625][T13573] EXT4-fs (loop5): Test dummy encryption mode enabled 10:57:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000011000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 672.041214][T13573] EXT4-fs (loop5): inodes count not valid: 111392 vs 32 [ 672.067787][T13596] loop1: detected capacity change from 520 to 0 [ 672.075696][T13598] loop4: detected capacity change from 512 to 0 10:57:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20e901004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 672.133980][T13599] loop3: detected capacity change from 512 to 0 [ 672.146480][T13602] loop0: detected capacity change from 512 to 0 [ 672.154396][T13596] EXT4-fs (loop1): Test dummy encryption mode enabled [ 672.164468][T13598] EXT4-fs (loop4): Test dummy encryption mode enabled [ 672.173358][T13598] EXT4-fs (loop4): inodes count not valid: 6815776 vs 32 [ 672.182808][T13609] loop2: detected capacity change from 512 to 0 [ 672.190025][T13596] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 672.205108][T13599] EXT4-fs (loop3): Test dummy encryption mode enabled [ 672.221504][T13599] EXT4-fs (loop3): inodes count not valid: 2032416 vs 32 [ 672.268365][T13609] EXT4-fs (loop2): Test dummy encryption mode enabled [ 672.275532][T13602] EXT4-fs (loop0): Test dummy encryption mode enabled 10:57:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20006c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 672.323445][T13602] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 4)! [ 672.342097][T13609] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 672.381878][T13621] loop5: detected capacity change from 512 to 0 [ 672.382865][T13602] EXT4-fs (loop0): group descriptors corrupted! [ 672.408111][T13609] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 672.423558][T13609] EXT4-fs (loop2): get root inode failed [ 672.432838][T13609] EXT4-fs (loop2): mount failed 10:57:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000012000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000600000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 672.575738][T13621] EXT4-fs (loop5): Test dummy encryption mode enabled [ 672.608211][T13621] EXT4-fs (loop5): inodes count not valid: 125216 vs 32 [ 672.609169][T13629] loop3: detected capacity change from 512 to 0 [ 672.726598][T13629] EXT4-fs (loop3): Test dummy encryption mode enabled [ 672.733509][T13638] loop4: detected capacity change from 512 to 0 [ 672.742847][T13641] loop1: detected capacity change from 32896 to 0 [ 672.745575][T13629] EXT4-fs (loop3): inodes count not valid: 2097184 vs 32 [ 672.774416][T13639] loop2: detected capacity change from 512 to 0 [ 672.785884][T13638] EXT4-fs (loop4): Test dummy encryption mode enabled [ 672.792883][T13638] EXT4-fs (loop4): inodes count not valid: 7077920 vs 32 [ 672.792921][T13621] loop5: detected capacity change from 512 to 0 [ 672.813694][T13621] EXT4-fs (loop5): Test dummy encryption mode enabled [ 672.821208][T13641] EXT4-fs (loop1): Test dummy encryption mode enabled [ 672.829495][T13621] EXT4-fs (loop5): inodes count not valid: 125216 vs 32 [ 672.839994][T13653] loop0: detected capacity change from 512 to 0 10:57:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200074004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 672.865576][T13641] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 672.890269][T13639] EXT4-fs (loop2): Test dummy encryption mode enabled [ 672.890406][T13653] EXT4-fs (loop0): Test dummy encryption mode enabled [ 672.898716][T13639] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended 10:57:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf4000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20f801004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 672.934540][T13653] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 4)! [ 672.946565][T13639] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 672.954723][T13653] EXT4-fs (loop0): group descriptors corrupted! [ 672.963872][T13639] EXT4-fs (loop2): get root inode failed [ 672.970980][T13639] EXT4-fs (loop2): mount failed [ 672.996113][T13629] loop3: detected capacity change from 512 to 0 [ 673.077247][T13666] loop4: detected capacity change from 512 to 0 10:57:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="201020004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 673.159952][T13672] loop1: detected capacity change from 264192 to 0 [ 673.175511][T13666] EXT4-fs (loop4): Test dummy encryption mode enabled 10:57:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200402004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000001a000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000700000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 673.247143][T13666] EXT4-fs (loop4): inodes count not valid: 7602208 vs 32 [ 673.283828][T13683] loop3: detected capacity change from 512 to 0 [ 673.297499][T13672] EXT4-fs (loop1): Test dummy encryption mode enabled [ 673.327774][T13672] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20e901004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 673.392215][T13683] EXT4-fs (loop3): Test dummy encryption mode enabled [ 673.420416][T13683] EXT4-fs (loop3): inodes count not valid: 2101280 vs 32 [ 673.432701][T13666] loop4: detected capacity change from 512 to 0 10:57:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200079004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 673.460713][T13695] loop2: detected capacity change from 512 to 0 [ 673.502703][T13694] loop5: detected capacity change from 512 to 0 [ 673.511355][T13696] loop0: detected capacity change from 512 to 0 [ 673.622126][T13696] EXT4-fs (loop0): Test dummy encryption mode enabled [ 673.635862][T13695] EXT4-fs (loop2): Test dummy encryption mode enabled [ 673.641754][T13708] loop4: detected capacity change from 512 to 0 [ 673.642972][T13694] EXT4-fs (loop5): Test dummy encryption mode enabled [ 673.650883][T13708] EXT4-fs (loop4): Test dummy encryption mode enabled [ 673.662917][T13708] EXT4-fs (loop4): inodes count not valid: 7929888 vs 32 [ 673.682482][T13683] loop3: detected capacity change from 512 to 0 [ 673.689668][T13696] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 4)! [ 673.701532][T13695] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 673.722396][T13694] EXT4-fs (loop5): inodes count not valid: 132128 vs 32 [ 673.733751][T13696] EXT4-fs (loop0): group descriptors corrupted! [ 673.761536][T13683] EXT4-fs (loop3): Test dummy encryption mode enabled [ 673.774517][T13708] loop4: detected capacity change from 512 to 0 [ 673.831085][T13683] EXT4-fs (loop3): inodes count not valid: 2101280 vs 32 [ 673.839599][T13708] EXT4-fs (loop4): Test dummy encryption mode enabled [ 673.862352][T13695] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 673.887750][T13708] EXT4-fs (loop4): inodes count not valid: 7929888 vs 32 [ 673.895015][T13695] EXT4-fs (loop2): get root inode failed [ 673.901182][T13695] EXT4-fs (loop2): mount failed [ 673.917321][T13719] loop1: detected capacity change from 512 to 0 10:57:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000800000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="205d02004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20007a004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 674.054422][T13719] EXT4-fs (loop1): Test dummy encryption mode enabled [ 674.063726][T13719] EXT4-fs (loop1): inodes count not valid: 125216 vs 32 10:57:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200021004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf2000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000020000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 674.204443][T13735] loop5: detected capacity change from 512 to 0 [ 674.255815][T13735] EXT4-fs (loop5): Test dummy encryption mode enabled [ 674.265259][T13735] EXT4-fs (loop5): inodes count not valid: 154912 vs 32 [ 674.282566][T13731] loop0: detected capacity change from 512 to 0 [ 674.323794][T13742] loop3: detected capacity change from 512 to 0 [ 674.332270][T13749] loop1: detected capacity change from 264192 to 0 [ 674.352811][T13750] loop2: detected capacity change from 512 to 0 [ 674.361495][T13742] EXT4-fs (loop3): Test dummy encryption mode enabled 10:57:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="209d02004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 674.371013][T13742] EXT4-fs (loop3): inodes count not valid: 2162720 vs 32 [ 674.390406][T13731] EXT4-fs (loop0): Test dummy encryption mode enabled [ 674.393528][T13734] loop4: detected capacity change from 512 to 0 [ 674.413784][T13731] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 674.418907][T13749] EXT4-fs (loop1): Test dummy encryption mode enabled [ 674.445951][T13750] EXT4-fs (loop2): Test dummy encryption mode enabled 10:57:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000900000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 674.465745][T13750] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 674.480939][T13749] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 674.506966][T13750] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 674.520723][T13750] EXT4-fs (loop2): get root inode failed [ 674.530209][T13750] EXT4-fs (loop2): mount failed 10:57:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200089004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 674.609644][T13742] loop3: detected capacity change from 512 to 0 10:57:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4ec02, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200025004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 674.699196][T13765] loop5: detected capacity change from 512 to 0 10:57:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000021000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 674.766897][T13765] EXT4-fs (loop5): Test dummy encryption mode enabled [ 674.798553][T13765] EXT4-fs (loop5): inodes count not valid: 171296 vs 32 [ 674.871061][T13778] loop0: detected capacity change from 512 to 0 [ 674.975877][T13781] loop4: detected capacity change from 512 to 0 [ 675.008353][T13786] loop2: detected capacity change from 512 to 0 [ 675.022001][T13778] EXT4-fs (loop0): Test dummy encryption mode enabled [ 675.037496][T13781] EXT4-fs (loop4): Test dummy encryption mode enabled [ 675.054214][T13765] loop5: detected capacity change from 512 to 0 [ 675.060704][T13781] EXT4-fs (loop4): inodes count not valid: 8978464 vs 32 10:57:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 675.063234][T13778] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 675.091326][T13786] EXT4-fs (loop2): Test dummy encryption mode enabled [ 675.091464][T13765] EXT4-fs (loop5): Test dummy encryption mode enabled [ 675.108192][T13798] loop3: detected capacity change from 512 to 0 [ 675.114636][T13786] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 675.134312][T13765] EXT4-fs (loop5): inodes count not valid: 171296 vs 32 [ 675.144584][T13786] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 675.158541][T13786] EXT4-fs (loop2): get root inode failed [ 675.160778][T13801] loop1: detected capacity change from 630 to 0 [ 675.164211][T13786] EXT4-fs (loop2): mount failed [ 675.216268][T13798] EXT4-fs (loop3): Test dummy encryption mode enabled [ 675.223307][T13798] EXT4-fs (loop3): inodes count not valid: 2424864 vs 32 10:57:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20a102004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 675.271744][T13781] loop4: detected capacity change from 512 to 0 [ 675.410416][T13781] EXT4-fs (loop4): Test dummy encryption mode enabled [ 675.425817][T13801] EXT4-fs (loop1): Test dummy encryption mode enabled [ 675.453810][T13798] loop3: detected capacity change from 512 to 0 [ 675.455495][T13781] EXT4-fs (loop4): inodes count not valid: 8978464 vs 32 [ 675.491449][T13798] EXT4-fs (loop3): Test dummy encryption mode enabled 10:57:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000027000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 675.531980][T13801] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 675.567477][T13823] loop5: detected capacity change from 512 to 0 10:57:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40604, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 675.582552][T13824] loop0: detected capacity change from 512 to 0 [ 675.583885][T13798] EXT4-fs (loop3): inodes count not valid: 2424864 vs 32 [ 675.597924][T13823] EXT4-fs (loop5): Test dummy encryption mode enabled [ 675.608214][T13823] EXT4-fs (loop5): inodes count not valid: 172320 vs 32 10:57:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c0004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 675.659726][T13824] EXT4-fs (loop0): Test dummy encryption mode enabled [ 675.678891][T13824] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 675.693118][T13831] loop2: detected capacity change from 512 to 0 10:57:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20c302004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20002e004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 675.719003][T13831] EXT4-fs (loop2): Test dummy encryption mode enabled [ 675.742311][T13831] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended 10:57:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001b00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 675.783097][T13831] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 675.799240][T13831] EXT4-fs (loop2): get root inode failed [ 675.804920][T13831] EXT4-fs (loop2): mount failed [ 675.833124][T13841] loop4: detected capacity change from 512 to 0 [ 675.841942][T13842] loop1: detected capacity change from 515 to 0 [ 675.959109][T13847] loop5: detected capacity change from 512 to 0 [ 675.984253][T13842] EXT4-fs (loop1): Test dummy encryption mode enabled [ 675.991564][T13841] EXT4-fs (loop4): Test dummy encryption mode enabled [ 676.009689][T13847] EXT4-fs (loop5): Test dummy encryption mode enabled [ 676.021610][T13841] EXT4-fs (loop4): inodes count not valid: 12582944 vs 32 [ 676.030756][T13847] EXT4-fs (loop5): inodes count not valid: 181024 vs 32 [ 676.040912][T13842] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000002e000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4e002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 676.079252][T13859] loop3: detected capacity change from 512 to 0 [ 676.096441][T13847] loop5: detected capacity change from 512 to 0 [ 676.115600][T13864] loop0: detected capacity change from 512 to 0 [ 676.138125][T13859] EXT4-fs (loop3): Test dummy encryption mode enabled [ 676.145314][T13847] EXT4-fs (loop5): Test dummy encryption mode enabled [ 676.152840][T13864] EXT4-fs (loop0): Test dummy encryption mode enabled [ 676.166102][T13859] EXT4-fs (loop3): inodes count not valid: 3014688 vs 32 [ 676.173272][T13847] EXT4-fs (loop5): inodes count not valid: 181024 vs 32 [ 676.192418][T13864] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 676.206813][T13841] loop4: detected capacity change from 512 to 0 [ 676.275797][T13880] loop2: detected capacity change from 512 to 0 [ 676.284672][T13841] EXT4-fs (loop4): Test dummy encryption mode enabled [ 676.290588][T13880] EXT4-fs (loop2): Test dummy encryption mode enabled [ 676.298676][T13880] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended 10:57:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200032004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20ec02004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 676.314258][T13880] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 676.332492][T13880] EXT4-fs (loop2): get root inode failed [ 676.344592][T13841] EXT4-fs (loop4): inodes count not valid: 12582944 vs 32 [ 676.355701][T13880] EXT4-fs (loop2): mount failed [ 676.469404][T13885] loop1: detected capacity change from 624 to 0 10:57:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000e5004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 676.579805][T13887] loop3: detected capacity change from 512 to 0 [ 676.586920][T13885] EXT4-fs (loop1): Test dummy encryption mode enabled [ 676.595017][T13885] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000003f000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 676.635574][T13893] loop5: detected capacity change from 512 to 0 [ 676.676228][T13893] EXT4-fs (loop5): Test dummy encryption mode enabled [ 676.680070][T13887] EXT4-fs (loop3): Test dummy encryption mode enabled [ 676.695645][T13893] EXT4-fs (loop5): inodes count not valid: 191520 vs 32 10:57:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe4000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 676.724240][T13887] EXT4-fs (loop3): inodes count not valid: 3276832 vs 32 [ 676.764147][T13906] loop4: detected capacity change from 512 to 0 [ 676.782368][T13906] EXT4-fs (loop4): Test dummy encryption mode enabled [ 676.790887][T13906] EXT4-fs (loop4): inodes count not valid: 15007776 vs 32 [ 676.797328][T13893] loop5: detected capacity change from 512 to 0 [ 676.811124][T13907] loop2: detected capacity change from 512 to 0 [ 676.898069][T13908] loop0: detected capacity change from 512 to 0 [ 676.905141][T13907] EXT4-fs (loop2): Test dummy encryption mode enabled [ 676.912013][T13893] EXT4-fs (loop5): Test dummy encryption mode enabled [ 676.921503][T13893] EXT4-fs (loop5): inodes count not valid: 191520 vs 32 [ 676.925764][T13907] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 676.944552][T13907] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 676.967480][T13908] EXT4-fs (loop0): Test dummy encryption mode enabled [ 676.974361][T13907] EXT4-fs (loop2): get root inode failed [ 676.982336][T13907] EXT4-fs (loop2): mount failed 10:57:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200003004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 676.996701][T13908] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 677.019067][T13906] loop4: detected capacity change from 512 to 0 [ 677.032875][T13925] loop1: detected capacity change from 264192 to 0 [ 677.104151][T13887] loop3: detected capacity change from 512 to 0 [ 677.111679][T13906] EXT4-fs (loop4): Test dummy encryption mode enabled [ 677.118690][T13906] EXT4-fs (loop4): inodes count not valid: 15007776 vs 32 [ 677.126298][T13925] EXT4-fs (loop1): Test dummy encryption mode enabled [ 677.140445][T13887] EXT4-fs (loop3): Test dummy encryption mode enabled 10:57:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20013c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000056000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003800000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 677.171048][T13887] EXT4-fs (loop3): inodes count not valid: 3276832 vs 32 [ 677.202613][T13925] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe1020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000e6004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 677.365619][T13937] loop5: detected capacity change from 512 to 0 [ 677.411000][T13944] loop2: detected capacity change from 512 to 0 [ 677.462453][T13937] EXT4-fs (loop5): Test dummy encryption mode enabled [ 677.470613][T13937] EXT4-fs (loop5): inodes count not valid: 196640 vs 32 [ 677.475209][T13943] loop3: detected capacity change from 512 to 0 [ 677.489387][T13944] EXT4-fs (loop2): Test dummy encryption mode enabled [ 677.498996][T13952] loop0: detected capacity change from 512 to 0 [ 677.511886][T13944] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 677.526465][T13956] loop1: detected capacity change from 264192 to 0 [ 677.551598][T13944] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 677.564123][T13944] EXT4-fs (loop2): get root inode failed [ 677.575969][T13944] EXT4-fs (loop2): mount failed [ 677.581586][T13952] EXT4-fs (loop0): Test dummy encryption mode enabled [ 677.583885][T13943] EXT4-fs (loop3): Test dummy encryption mode enabled [ 677.596804][T13963] loop4: detected capacity change from 512 to 0 [ 677.600969][T13943] EXT4-fs (loop3): inodes count not valid: 3932448 vs 32 [ 677.605661][T13956] EXT4-fs (loop1): Test dummy encryption mode enabled [ 677.626940][T13937] loop5: detected capacity change from 512 to 0 10:57:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20003f004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 677.681866][T13937] EXT4-fs (loop5): Test dummy encryption mode enabled [ 677.687715][T13963] EXT4-fs (loop4): Test dummy encryption mode enabled [ 677.696714][T13956] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 677.710566][T13963] EXT4-fs (loop4): inodes count not valid: 15073312 vs 32 [ 677.721175][T13952] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 677.736517][T13937] EXT4-fs (loop5): inodes count not valid: 196640 vs 32 [ 677.815837][T13977] loop3: detected capacity change from 512 to 0 [ 677.912327][T13963] loop4: detected capacity change from 512 to 0 [ 677.931471][T13977] EXT4-fs (loop3): Test dummy encryption mode enabled [ 677.944389][T13977] EXT4-fs (loop3): inodes count not valid: 4128800 vs 32 [ 677.949844][T13963] EXT4-fs (loop4): Test dummy encryption mode enabled 10:57:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="204503004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000006f000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 677.959581][T13963] EXT4-fs (loop4): inodes count not valid: 15073312 vs 32 10:57:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003900000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000e7004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 678.137971][T13991] loop5: detected capacity change from 512 to 0 [ 678.148792][T13977] loop3: detected capacity change from 512 to 0 [ 678.169072][T13995] loop2: detected capacity change from 512 to 0 [ 678.192997][T13991] EXT4-fs (loop5): Test dummy encryption mode enabled [ 678.200537][T13977] EXT4-fs (loop3): Test dummy encryption mode enabled [ 678.212721][T13991] EXT4-fs (loop5): inodes count not valid: 214304 vs 32 [ 678.220992][T13977] EXT4-fs (loop3): inodes count not valid: 4128800 vs 32 10:57:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003a00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 678.246057][T13995] EXT4-fs (loop2): Test dummy encryption mode enabled [ 678.260521][T13995] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 678.280337][T13995] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 678.293043][T13995] EXT4-fs (loop2): get root inode failed [ 678.302823][T13995] EXT4-fs (loop2): mount failed [ 678.315161][T13991] loop5: detected capacity change from 512 to 0 [ 678.322468][T13991] EXT4-fs (loop5): Test dummy encryption mode enabled [ 678.326204][T14008] loop1: detected capacity change from 264192 to 0 10:57:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200040004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 678.340322][T13991] EXT4-fs (loop5): inodes count not valid: 214304 vs 32 10:57:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000407fffffff000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 678.376557][T14008] EXT4-fs (loop1): Test dummy encryption mode enabled [ 678.384088][T14015] loop4: detected capacity change from 512 to 0 [ 678.394504][T14008] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 678.413681][T14018] loop0: detected capacity change from 512 to 0 10:57:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="204d03004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 678.458451][T14015] EXT4-fs (loop4): Test dummy encryption mode enabled [ 678.479527][T14018] EXT4-fs (loop0): Test dummy encryption mode enabled [ 678.500123][T14015] EXT4-fs (loop4): inodes count not valid: 15138848 vs 32 [ 678.530718][T14018] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 678.559012][T14034] loop2: detected capacity change from 512 to 0 [ 678.566279][T14035] loop3: detected capacity change from 512 to 0 [ 678.615840][T14031] loop5: detected capacity change from 512 to 0 [ 678.631464][T14034] EXT4-fs (loop2): Test dummy encryption mode enabled [ 678.638770][T14035] EXT4-fs (loop3): Test dummy encryption mode enabled [ 678.645887][T14015] loop4: detected capacity change from 512 to 0 [ 678.685492][T14035] EXT4-fs (loop3): inodes count not valid: 4194336 vs 32 [ 678.704733][T14034] EXT4-fs (loop2): bad geometry: block count 4294934336 exceeds size of device (64 blocks) [ 678.704769][T14050] loop1: detected capacity change from 264192 to 0 10:57:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003b00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 678.730680][T14050] EXT4-fs (loop1): Test dummy encryption mode enabled [ 678.752360][T14050] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 678.770166][T14031] EXT4-fs (loop5): Test dummy encryption mode enabled 10:57:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200141004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4a000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000020003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 678.791155][T14031] EXT4-fs (loop5): inodes count not valid: 216352 vs 32 10:57:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000e8004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 678.955697][T14057] loop3: detected capacity change from 512 to 0 [ 679.056046][T14057] EXT4-fs (loop3): Test dummy encryption mode enabled [ 679.056085][T14068] loop2: detected capacity change from 512 to 0 [ 679.071403][T14057] EXT4-fs (loop3): inodes count not valid: 4260128 vs 32 [ 679.072729][T14069] loop0: detected capacity change from 512 to 0 [ 679.090128][T14070] loop1: detected capacity change from 592 to 0 [ 679.098853][T14031] loop5: detected capacity change from 512 to 0 [ 679.107507][T14068] EXT4-fs (loop2): Test dummy encryption mode enabled [ 679.115479][T14068] EXT4-fs (loop2): bad geometry: block count 131136 exceeds size of device (64 blocks) [ 679.146773][T14069] EXT4-fs (loop0): Test dummy encryption mode enabled [ 679.153875][T14031] EXT4-fs (loop5): Test dummy encryption mode enabled [ 679.161203][T14031] EXT4-fs (loop5): inodes count not valid: 216352 vs 32 [ 679.185568][T14069] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 679.201320][T14070] EXT4-fs (loop1): Test dummy encryption mode enabled [ 679.209948][T14083] loop4: detected capacity change from 512 to 0 [ 679.240053][T14057] loop3: detected capacity change from 512 to 0 [ 679.247743][T14083] EXT4-fs (loop4): Test dummy encryption mode enabled 10:57:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20a503004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20f003004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000030003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 679.284712][T14083] EXT4-fs (loop4): inodes count not valid: 15204384 vs 32 [ 679.313046][T14057] EXT4-fs (loop3): Test dummy encryption mode enabled 10:57:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003c00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 679.343208][T14070] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 679.362174][T14057] EXT4-fs (loop3): inodes count not valid: 4260128 vs 32 10:57:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402a1, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200345004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000e9004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 679.492679][T14100] loop5: detected capacity change from 512 to 0 [ 679.607256][T14100] EXT4-fs (loop5): Test dummy encryption mode enabled [ 679.607739][T14106] loop2: detected capacity change from 512 to 0 [ 679.628431][T14100] EXT4-fs (loop5): inodes count not valid: 258080 vs 32 [ 679.675835][T14106] EXT4-fs (loop2): Test dummy encryption mode enabled [ 679.684562][T14106] EXT4-fs (loop2): bad geometry: block count 196672 exceeds size of device (64 blocks) [ 679.706026][T14116] loop4: detected capacity change from 512 to 0 [ 679.713354][T14117] loop1: detected capacity change from 513 to 0 [ 679.723814][T14118] loop0: detected capacity change from 512 to 0 [ 679.733896][T14119] loop3: detected capacity change from 512 to 0 [ 679.744057][T14100] loop5: detected capacity change from 512 to 0 [ 679.755864][T14116] EXT4-fs (loop4): Test dummy encryption mode enabled [ 679.760447][T14118] EXT4-fs (loop0): Test dummy encryption mode enabled [ 679.767259][T14100] EXT4-fs (loop5): Test dummy encryption mode enabled [ 679.769960][T14117] EXT4-fs (loop1): Test dummy encryption mode enabled [ 679.783264][T14100] EXT4-fs (loop5): inodes count not valid: 258080 vs 32 10:57:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20f803004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 679.821840][T14116] EXT4-fs (loop4): inodes count not valid: 15269920 vs 32 [ 679.833144][T14119] EXT4-fs (loop3): Test dummy encryption mode enabled [ 679.852659][T14118] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000040003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003d00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f6004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 679.906250][T14119] EXT4-fs (loop3): inodes count not valid: 4522784 vs 32 [ 679.914401][T14117] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 679.960051][T14138] loop5: detected capacity change from 512 to 0 10:57:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x47a00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 680.122773][T14138] EXT4-fs (loop5): Test dummy encryption mode enabled [ 680.131697][T14119] loop3: detected capacity change from 512 to 0 [ 680.146524][T14138] EXT4-fs (loop5): inodes count not valid: 260128 vs 32 [ 680.165914][T14143] loop2: detected capacity change from 512 to 0 [ 680.174456][T14119] EXT4-fs (loop3): Test dummy encryption mode enabled [ 680.200642][T14119] EXT4-fs (loop3): inodes count not valid: 4522784 vs 32 [ 680.228763][T14143] EXT4-fs (loop2): Test dummy encryption mode enabled [ 680.239578][T14143] EXT4-fs (loop2): bad geometry: block count 262208 exceeds size of device (64 blocks) [ 680.243510][T14160] loop1: detected capacity change from 573 to 0 [ 680.259128][T14156] loop0: detected capacity change from 512 to 0 [ 680.315706][T14157] loop4: detected capacity change from 512 to 0 [ 680.343462][T14156] EXT4-fs (loop0): Test dummy encryption mode enabled [ 680.350439][T14138] loop5: detected capacity change from 512 to 0 10:57:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200048004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000050003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 680.384626][T14156] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 680.436380][T14138] EXT4-fs (loop5): Test dummy encryption mode enabled [ 680.443975][T14160] EXT4-fs (loop1): Test dummy encryption mode enabled [ 680.451201][T14157] EXT4-fs (loop4): Test dummy encryption mode enabled [ 680.464356][T14157] EXT4-fs (loop4): inodes count not valid: 16121888 vs 32 10:57:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003e00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 680.484146][T14160] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 680.485068][T14138] EXT4-fs (loop5): inodes count not valid: 260128 vs 32 10:57:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8f010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200204004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 680.685188][T14157] loop4: detected capacity change from 512 to 0 [ 680.694298][T14181] loop3: detected capacity change from 512 to 0 [ 680.712580][T14186] loop0: detected capacity change from 512 to 0 [ 680.770004][T14183] loop2: detected capacity change from 512 to 0 [ 680.795796][T14157] EXT4-fs (loop4): Test dummy encryption mode enabled [ 680.802930][T14186] EXT4-fs (loop0): Test dummy encryption mode enabled [ 680.811595][T14181] EXT4-fs (loop3): Test dummy encryption mode enabled [ 680.827310][T14157] EXT4-fs (loop4): inodes count not valid: 16121888 vs 32 [ 680.836717][T14195] loop1: detected capacity change from 264192 to 0 [ 680.843647][T14181] EXT4-fs (loop3): inodes count not valid: 4718624 vs 32 [ 680.854559][T14186] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200012014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 680.874196][T14195] EXT4-fs (loop1): Test dummy encryption mode enabled [ 680.888462][T14183] EXT4-fs (loop2): Test dummy encryption mode enabled [ 680.904282][T14183] EXT4-fs (loop2): bad geometry: block count 327744 exceeds size of device (64 blocks) [ 680.923173][T14195] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000005e00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20004c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x46c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 681.061343][T14203] loop5: detected capacity change from 512 to 0 [ 681.085184][T14203] EXT4-fs (loop5): Test dummy encryption mode enabled [ 681.097717][T14203] EXT4-fs (loop5): inodes count not valid: 262688 vs 32 10:57:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000060003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 681.225980][T14217] loop3: detected capacity change from 512 to 0 [ 681.232759][T14219] loop4: detected capacity change from 512 to 0 [ 681.247927][T14220] loop0: detected capacity change from 512 to 0 [ 681.261701][T14224] loop1: detected capacity change from 566 to 0 [ 681.268831][T14219] EXT4-fs (loop4): Test dummy encryption mode enabled [ 681.277515][T14217] EXT4-fs (loop3): Test dummy encryption mode enabled [ 681.292370][T14217] EXT4-fs (loop3): inodes count not valid: 4980768 vs 32 [ 681.301115][T14219] EXT4-fs (loop4): inodes count not valid: 17956896 vs 32 [ 681.308605][T14203] loop5: detected capacity change from 512 to 0 [ 681.316929][T14220] EXT4-fs (loop0): Test dummy encryption mode enabled [ 681.319856][T14234] loop2: detected capacity change from 512 to 0 [ 681.323839][T14220] EXT4-fs (loop0): bad geometry: block count 94 exceeds size of device (64 blocks) [ 681.339332][T14234] EXT4-fs (loop2): Test dummy encryption mode enabled [ 681.343023][T14203] EXT4-fs (loop5): Test dummy encryption mode enabled [ 681.354596][T14224] EXT4-fs (loop1): Test dummy encryption mode enabled [ 681.367970][T14234] EXT4-fs (loop2): bad geometry: block count 393280 exceeds size of device (64 blocks) [ 681.391743][T14203] EXT4-fs (loop5): inodes count not valid: 262688 vs 32 [ 681.404177][T14224] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200604004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x46000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000070003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006f00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 681.556302][T14219] loop4: detected capacity change from 512 to 0 [ 681.569608][T14217] loop3: detected capacity change from 512 to 0 [ 681.652609][T14217] EXT4-fs (loop3): Test dummy encryption mode enabled [ 681.652667][T14219] EXT4-fs (loop4): Test dummy encryption mode enabled [ 681.672289][T14217] EXT4-fs (loop3): inodes count not valid: 4980768 vs 32 [ 681.692031][T14219] EXT4-fs (loop4): inodes count not valid: 17956896 vs 32 10:57:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20034d004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 681.731377][T14260] loop0: detected capacity change from 512 to 0 [ 681.738993][T14261] loop1: detected capacity change from 560 to 0 [ 681.749947][T14262] loop2: detected capacity change from 512 to 0 10:57:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200015014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 681.845325][T14263] loop5: detected capacity change from 512 to 0 [ 681.877149][T14260] EXT4-fs (loop0): Test dummy encryption mode enabled [ 681.884283][T14262] EXT4-fs (loop2): Test dummy encryption mode enabled [ 681.891630][T14260] EXT4-fs (loop0): bad geometry: block count 111 exceeds size of device (64 blocks) [ 681.892074][T14261] EXT4-fs (loop1): Test dummy encryption mode enabled [ 681.901441][T14263] EXT4-fs (loop5): Test dummy encryption mode enabled [ 681.916487][T14262] EXT4-fs (loop2): bad geometry: block count 458816 exceeds size of device (64 blocks) [ 681.934704][T14263] EXT4-fs (loop5): inodes count not valid: 263712 vs 32 [ 681.944499][T14261] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000080003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007c00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 682.095984][T14280] loop4: detected capacity change from 512 to 0 [ 682.122271][T14277] loop3: detected capacity change from 512 to 0 [ 682.156274][T14263] loop5: detected capacity change from 512 to 0 [ 682.179685][T14277] EXT4-fs (loop3): Test dummy encryption mode enabled [ 682.186956][T14280] EXT4-fs (loop4): Test dummy encryption mode enabled [ 682.199737][T14263] EXT4-fs (loop5): Test dummy encryption mode enabled 10:57:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401a2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 682.207771][T14277] EXT4-fs (loop3): inodes count not valid: 5047072 vs 32 [ 682.226535][T14280] EXT4-fs (loop4): inodes count not valid: 18153504 vs 32 [ 682.235717][T14263] EXT4-fs (loop5): inodes count not valid: 263712 vs 32 [ 682.244353][T14295] loop0: detected capacity change from 512 to 0 10:57:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="201004004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 682.257686][T14298] loop2: detected capacity change from 512 to 0 [ 682.379201][T14295] EXT4-fs (loop0): Test dummy encryption mode enabled [ 682.386139][T14298] EXT4-fs (loop2): Test dummy encryption mode enabled [ 682.400077][T14298] EXT4-fs (loop2): bad geometry: block count 524352 exceeds size of device (64 blocks) [ 682.411173][T14277] loop3: detected capacity change from 512 to 0 10:57:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200029014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 682.422246][T14295] EXT4-fs (loop0): bad geometry: block count 124 exceeds size of device (64 blocks) [ 682.439558][T14277] EXT4-fs (loop3): Test dummy encryption mode enabled [ 682.446770][T14277] EXT4-fs (loop3): inodes count not valid: 5047072 vs 32 10:57:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20005c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000090003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 682.526731][T14309] loop1: detected capacity change from 512 to 0 10:57:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000c000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 682.629632][T14309] EXT4-fs (loop1): Test dummy encryption mode enabled [ 682.648847][T14309] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200005004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x45c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 682.685973][T14317] loop4: detected capacity change from 512 to 0 [ 682.693581][T14317] EXT4-fs (loop4): Test dummy encryption mode enabled [ 682.705678][T14317] EXT4-fs (loop4): inodes count not valid: 19464224 vs 32 [ 682.755692][T14328] loop5: detected capacity change from 512 to 0 [ 682.769222][T14317] loop4: detected capacity change from 512 to 0 [ 682.825956][T14328] EXT4-fs (loop5): Test dummy encryption mode enabled [ 682.831176][T14335] loop3: detected capacity change from 512 to 0 [ 682.844009][T14328] EXT4-fs (loop5): inodes count not valid: 327712 vs 32 [ 682.850042][T14331] loop2: detected capacity change from 512 to 0 10:57:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a0014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 682.870238][T14317] EXT4-fs (loop4): Test dummy encryption mode enabled [ 682.873851][T14334] loop0: detected capacity change from 512 to 0 [ 682.893329][T14317] EXT4-fs (loop4): inodes count not valid: 19464224 vs 32 [ 682.902279][T14335] EXT4-fs (loop3): Test dummy encryption mode enabled [ 682.939579][T14334] EXT4-fs (loop0): Test dummy encryption mode enabled [ 682.954160][T14331] EXT4-fs (loop2): Test dummy encryption mode enabled 10:57:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000e9014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200006004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 682.984096][T14335] EXT4-fs (loop3): inodes count not valid: 6029344 vs 32 [ 683.006331][T14334] EXT4-fs (loop0): bad geometry: block count 192 exceeds size of device (64 blocks) [ 683.025270][T14331] EXT4-fs (loop2): bad geometry: block count 589888 exceeds size of device (64 blocks) [ 683.116229][T14351] loop1: detected capacity change from 558 to 0 10:57:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000f801000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 683.215161][T14351] EXT4-fs (loop1): Test dummy encryption mode enabled [ 683.225907][T14359] loop5: detected capacity change from 512 to 0 [ 683.257788][T14351] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 683.279291][T14335] loop3: detected capacity change from 512 to 0 [ 683.287372][T14359] EXT4-fs (loop5): Test dummy encryption mode enabled 10:57:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000a0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 683.300370][T14359] EXT4-fs (loop5): inodes count not valid: 393248 vs 32 [ 683.318960][T14372] loop0: detected capacity change from 512 to 0 [ 683.327942][T14372] EXT4-fs (loop0): Test dummy encryption mode enabled [ 683.335227][T14335] EXT4-fs (loop3): Test dummy encryption mode enabled [ 683.342145][T14372] EXT4-fs (loop0): bad geometry: block count 504 exceeds size of device (64 blocks) 10:57:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4013c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 683.361962][T14374] loop4: detected capacity change from 512 to 0 [ 683.380923][T14335] EXT4-fs (loop3): inodes count not valid: 6029344 vs 32 10:57:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20025d004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 683.435553][T14374] EXT4-fs (loop4): Test dummy encryption mode enabled [ 683.442726][T14374] EXT4-fs (loop4): inodes count not valid: 32047136 vs 32 10:57:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f8014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 683.525810][T14359] loop5: detected capacity change from 512 to 0 10:57:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000f8ff030003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20025f004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 683.574373][T14359] EXT4-fs (loop5): Test dummy encryption mode enabled [ 683.594175][T14389] loop1: detected capacity change from 512 to 0 [ 683.611069][T14359] EXT4-fs (loop5): inodes count not valid: 393248 vs 32 [ 683.695944][T14389] EXT4-fs (loop1): Test dummy encryption mode enabled [ 683.704468][T14389] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200406004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 683.745149][T14392] loop2: detected capacity change from 512 to 0 [ 683.757993][T14398] loop0: detected capacity change from 512 to 0 10:57:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 683.805551][T14394] loop4: detected capacity change from 512 to 0 [ 683.819152][T14398] EXT4-fs (loop0): Test dummy encryption mode enabled [ 683.826530][T14392] EXT4-fs (loop2): Test dummy encryption mode enabled [ 683.841626][T14407] loop3: detected capacity change from 512 to 0 [ 683.849157][T14398] EXT4-fs (loop0): bad geometry: block count 262136 exceeds size of device (64 blocks) [ 683.858845][T14392] EXT4-fs (loop2): bad geometry: block count 655424 exceeds size of device (64 blocks) [ 683.869693][T14394] EXT4-fs (loop4): Test dummy encryption mode enabled [ 683.888942][T14407] EXT4-fs (loop3): Test dummy encryption mode enabled 10:57:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000008000000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 683.900858][T14394] EXT4-fs (loop4): inodes count not valid: 33030176 vs 32 [ 683.913873][T14407] EXT4-fs (loop3): inodes count not valid: 6226464 vs 32 [ 683.985470][T14416] loop5: detected capacity change from 512 to 0 [ 684.126333][T14417] loop1: detected capacity change from 264192 to 0 [ 684.145866][T14407] loop3: detected capacity change from 512 to 0 [ 684.158646][T14417] EXT4-fs (loop1): Test dummy encryption mode enabled [ 684.165645][T14416] EXT4-fs (loop5): Test dummy encryption mode enabled [ 684.174224][T14416] EXT4-fs (loop5): inodes count not valid: 394272 vs 32 10:57:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000b0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 684.198712][T14394] loop4: detected capacity change from 512 to 0 [ 684.209665][T14407] EXT4-fs (loop3): Test dummy encryption mode enabled [ 684.219351][T14394] EXT4-fs (loop4): Test dummy encryption mode enabled [ 684.230116][T14417] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 684.246758][T14407] EXT4-fs (loop3): inodes count not valid: 6226464 vs 32 [ 684.253916][T14435] loop0: detected capacity change from 512 to 0 [ 684.267729][T14394] EXT4-fs (loop4): inodes count not valid: 33030176 vs 32 10:57:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x44800, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200060004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 684.325170][T14439] loop2: detected capacity change from 512 to 0 [ 684.332288][T14435] EXT4-fs (loop0): Test dummy encryption mode enabled [ 684.342320][T14435] EXT4-fs (loop0): bad geometry: block count 2147483712 exceeds size of device (64 blocks) [ 684.364553][T14416] loop5: detected capacity change from 512 to 0 [ 684.445544][T14439] EXT4-fs (loop2): Test dummy encryption mode enabled [ 684.452937][T14439] EXT4-fs (loop2): bad geometry: block count 720960 exceeds size of device (64 blocks) [ 684.525287][T14416] EXT4-fs (loop5): Test dummy encryption mode enabled [ 684.532521][T14416] EXT4-fs (loop5): inodes count not valid: 394272 vs 32 [ 684.641234][T14454] loop3: detected capacity change from 512 to 0 10:57:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200007004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000001000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000c0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 684.689402][T14454] EXT4-fs (loop3): Test dummy encryption mode enabled [ 684.711784][T14454] EXT4-fs (loop3): inodes count not valid: 6291488 vs 32 [ 684.719255][T14462] loop4: detected capacity change from 512 to 0 [ 684.826201][T14462] EXT4-fs (loop4): Test dummy encryption mode enabled [ 684.833262][T14462] EXT4-fs (loop4): inodes count not valid: 33816608 vs 32 [ 684.883136][T14464] loop1: detected capacity change from 548 to 0 [ 684.933203][T14454] loop3: detected capacity change from 512 to 0 [ 684.940248][T14464] EXT4-fs (loop1): Test dummy encryption mode enabled [ 684.946445][T14480] loop2: detected capacity change from 512 to 0 [ 684.956748][T14473] loop0: detected capacity change from 512 to 0 [ 684.968068][T14474] loop5: detected capacity change from 512 to 0 [ 684.968086][T14464] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 684.985969][T14454] EXT4-fs (loop3): Test dummy encryption mode enabled [ 684.996093][T14462] loop4: detected capacity change from 512 to 0 [ 685.002576][T14454] EXT4-fs (loop3): inodes count not valid: 6291488 vs 32 [ 685.012324][T14474] EXT4-fs (loop5): Test dummy encryption mode enabled [ 685.015244][T14480] EXT4-fs (loop2): Test dummy encryption mode enabled [ 685.023036][T14462] EXT4-fs (loop4): Test dummy encryption mode enabled [ 685.027502][T14473] EXT4-fs (loop0): Test dummy encryption mode enabled [ 685.040141][T14462] EXT4-fs (loop4): inodes count not valid: 33816608 vs 32 [ 685.050556][T14480] EXT4-fs (loop2): bad geometry: block count 786496 exceeds size of device (64 blocks) [ 685.061988][T14474] EXT4-fs (loop5): inodes count not valid: 458784 vs 32 10:57:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x77000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 685.076721][T14473] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200167004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20005f024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000002000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000d0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 685.325652][T14496] loop4: detected capacity change from 512 to 0 [ 685.342743][T14474] loop5: detected capacity change from 512 to 0 [ 685.386650][T14507] loop1: detected capacity change from 264192 to 0 [ 685.386872][T14496] EXT4-fs (loop4): Test dummy encryption mode enabled [ 685.394203][T14474] EXT4-fs (loop5): Test dummy encryption mode enabled [ 685.410817][T14512] loop3: detected capacity change from 512 to 0 [ 685.418434][T14474] EXT4-fs (loop5): inodes count not valid: 458784 vs 32 [ 685.424568][T14496] EXT4-fs (loop4): inodes count not valid: 39780384 vs 32 [ 685.429007][T14513] loop2: detected capacity change from 512 to 0 [ 685.443366][T14507] EXT4-fs (loop1): Test dummy encryption mode enabled [ 685.450821][T14512] EXT4-fs (loop3): Test dummy encryption mode enabled [ 685.459639][T14512] EXT4-fs (loop3): inodes count not valid: 6750496 vs 32 [ 685.473194][T14507] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 685.500401][T14496] loop4: detected capacity change from 512 to 0 10:57:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200009004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 685.547970][T14513] EXT4-fs (loop2): Test dummy encryption mode enabled [ 685.556723][T14513] EXT4-fs (loop2): bad geometry: block count 852032 exceeds size of device (64 blocks) [ 685.585684][T14496] EXT4-fs (loop4): Test dummy encryption mode enabled 10:57:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x44000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 685.592820][T14496] EXT4-fs (loop4): inodes count not valid: 39780384 vs 32 [ 685.596119][T14526] loop0: detected capacity change from 512 to 0 10:57:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200085024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 685.696502][T14512] loop3: detected capacity change from 512 to 0 [ 685.703706][T14526] EXT4-fs (loop0): Test dummy encryption mode enabled [ 685.729952][T14526] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 685.768272][T14512] EXT4-fs (loop3): Test dummy encryption mode enabled [ 685.790916][T14512] EXT4-fs (loop3): inodes count not valid: 6750496 vs 32 10:57:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000e0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004002000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 685.821339][T14545] loop5: detected capacity change from 512 to 0 [ 685.832714][T14548] loop4: detected capacity change from 512 to 0 [ 685.863599][T14542] loop1: detected capacity change from 544 to 0 [ 685.870944][T14545] EXT4-fs (loop5): Test dummy encryption mode enabled [ 685.880401][T14545] EXT4-fs (loop5): inodes count not valid: 589856 vs 32 10:57:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200068004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20146b004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 685.929885][T14548] EXT4-fs (loop4): Test dummy encryption mode enabled [ 685.940518][T14542] EXT4-fs (loop1): Test dummy encryption mode enabled [ 685.960164][T14548] EXT4-fs (loop4): inodes count not valid: 42270752 vs 32 10:57:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400c7, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 685.988388][T14542] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 686.075456][T14560] loop2: detected capacity change from 512 to 0 [ 686.126484][T14564] loop3: detected capacity change from 512 to 0 [ 686.139444][T14559] loop0: detected capacity change from 512 to 0 [ 686.155041][T14560] EXT4-fs (loop2): Test dummy encryption mode enabled 10:57:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000a004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 686.168396][T14560] EXT4-fs (loop2): bad geometry: block count 917568 exceeds size of device (64 blocks) [ 686.196483][T14548] loop4: detected capacity change from 512 to 0 [ 686.203575][T14564] EXT4-fs (loop3): Test dummy encryption mode enabled [ 686.203692][T14559] EXT4-fs (loop0): Test dummy encryption mode enabled 10:57:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000f0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 686.219719][T14559] EXT4-fs (loop0): bad geometry: block count 576 exceeds size of device (64 blocks) [ 686.236122][T14564] EXT4-fs (loop3): inodes count not valid: 7017504 vs 32 [ 686.256503][T14548] EXT4-fs (loop4): Test dummy encryption mode enabled [ 686.265778][T14548] EXT4-fs (loop4): inodes count not valid: 42270752 vs 32 [ 686.336202][T14581] loop5: detected capacity change from 512 to 0 [ 686.342958][T14582] loop1: detected capacity change from 512 to 0 10:57:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20009d024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 686.426878][T14564] loop3: detected capacity change from 512 to 0 [ 686.439208][T14581] EXT4-fs (loop5): Test dummy encryption mode enabled [ 686.446386][T14582] EXT4-fs (loop1): Test dummy encryption mode enabled [ 686.465095][T14581] EXT4-fs (loop5): inodes count not valid: 655392 vs 32 10:57:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004003000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 686.486281][T14564] EXT4-fs (loop3): Test dummy encryption mode enabled [ 686.501036][T14564] EXT4-fs (loop3): inodes count not valid: 7017504 vs 32 [ 686.509311][T14582] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 686.526623][T14595] loop2: detected capacity change from 512 to 0 10:57:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20006c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400c6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 686.635512][T14601] loop4: detected capacity change from 512 to 0 [ 686.642677][T14595] EXT4-fs (loop2): Test dummy encryption mode enabled [ 686.650193][T14581] loop5: detected capacity change from 512 to 0 [ 686.663843][T14595] EXT4-fs (loop2): bad geometry: block count 983104 exceeds size of device (64 blocks) [ 686.718969][T14601] EXT4-fs (loop4): Test dummy encryption mode enabled [ 686.726257][T14581] EXT4-fs (loop5): Test dummy encryption mode enabled [ 686.733251][T14581] EXT4-fs (loop5): inodes count not valid: 655392 vs 32 [ 686.733250][T14601] EXT4-fs (loop4): inodes count not valid: 43843616 vs 32 [ 686.855398][T14611] loop0: detected capacity change from 512 to 0 10:57:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000b004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 686.921805][T14615] loop3: detected capacity change from 512 to 0 [ 686.931313][T14611] EXT4-fs (loop0): Test dummy encryption mode enabled [ 686.949028][T14601] loop4: detected capacity change from 512 to 0 [ 686.963642][T14615] EXT4-fs (loop3): Test dummy encryption mode enabled 10:57:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000100003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 686.963693][T14601] EXT4-fs (loop4): Test dummy encryption mode enabled [ 686.980720][T14615] EXT4-fs (loop3): inodes count not valid: 7077920 vs 32 [ 686.989080][T14611] EXT4-fs (loop0): bad geometry: block count 832 exceeds size of device (64 blocks) [ 687.000293][T14601] EXT4-fs (loop4): inodes count not valid: 43843616 vs 32 [ 687.023212][T14626] loop1: detected capacity change from 512 to 0 10:57:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a1024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 687.165282][T14626] EXT4-fs (loop1): Test dummy encryption mode enabled [ 687.173694][T14626] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004004000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4007a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 687.206655][T14634] loop5: detected capacity change from 512 to 0 [ 687.226652][T14634] EXT4-fs (loop5): Test dummy encryption mode enabled [ 687.236641][T14634] EXT4-fs (loop5): inodes count not valid: 720928 vs 32 [ 687.236658][T14615] loop3: detected capacity change from 512 to 0 [ 687.305292][T14646] loop4: detected capacity change from 512 to 0 [ 687.312294][T14615] EXT4-fs (loop3): Test dummy encryption mode enabled [ 687.313133][T14645] loop2: detected capacity change from 512 to 0 [ 687.328282][T14615] EXT4-fs (loop3): inodes count not valid: 7077920 vs 32 [ 687.375771][T14645] EXT4-fs (loop2): Test dummy encryption mode enabled [ 687.376252][T14646] EXT4-fs (loop4): Test dummy encryption mode enabled [ 687.393191][T14634] loop5: detected capacity change from 512 to 0 [ 687.403992][T14646] EXT4-fs (loop4): inodes count not valid: 44105760 vs 32 [ 687.408585][T14645] EXT4-fs (loop2): bad geometry: block count 1048640 exceeds size of device (64 blocks) 10:57:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200074004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 687.411259][T14655] loop0: detected capacity change from 512 to 0 [ 687.434770][T14634] EXT4-fs (loop5): Test dummy encryption mode enabled [ 687.447695][T14634] EXT4-fs (loop5): inodes count not valid: 720928 vs 32 [ 687.515324][T14655] EXT4-fs (loop0): Test dummy encryption mode enabled [ 687.522492][T14655] EXT4-fs (loop0): bad geometry: block count 1088 exceeds size of device (64 blocks) 10:57:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000110003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 687.565283][T14662] loop1: detected capacity change from 512 to 0 10:57:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 687.694914][T14662] EXT4-fs (loop1): Test dummy encryption mode enabled [ 687.695340][T14646] loop4: detected capacity change from 512 to 0 [ 687.713427][T14662] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:57:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004005000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000ec024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:57:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40074, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 687.790077][T14676] loop2: detected capacity change from 512 to 0 [ 687.797140][T14677] loop3: detected capacity change from 512 to 0 [ 687.840088][T14677] EXT4-fs (loop3): Test dummy encryption mode enabled [ 687.852944][T14687] loop0: detected capacity change from 512 to 0 [ 687.861095][T14677] EXT4-fs (loop3): inodes count not valid: 7602208 vs 32 [ 687.865094][T14687] EXT4-fs (loop0): Test dummy encryption mode enabled [ 687.879220][T14687] EXT4-fs (loop0): bad geometry: block count 1344 exceeds size of device (64 blocks) [ 687.906399][T14676] EXT4-fs (loop2): Test dummy encryption mode enabled [ 687.914158][T14676] EXT4-fs (loop2): bad geometry: block count 1114176 exceeds size of device (64 blocks) [ 687.922548][T14689] loop5: detected capacity change from 512 to 0 10:57:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004006000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 688.046395][T14689] EXT4-fs (loop5): Test dummy encryption mode enabled [ 688.058121][T14689] EXT4-fs (loop5): inodes count not valid: 786464 vs 32 [ 688.095293][T14699] loop1: detected capacity change from 512 to 0 10:57:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000120003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 688.141355][T14677] loop3: detected capacity change from 512 to 0 [ 688.152473][T14694] loop4: detected capacity change from 512 to 0 10:57:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20007a004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 688.206105][T14710] loop0: detected capacity change from 512 to 0 [ 688.213185][T14694] EXT4-fs (loop4): Test dummy encryption mode enabled [ 688.221427][T14689] loop5: detected capacity change from 512 to 0 [ 688.228512][T14694] EXT4-fs (loop4): inodes count not valid: 49020960 vs 32 [ 688.325310][T14699] EXT4-fs (loop1): Test dummy encryption mode enabled [ 688.325349][T14710] EXT4-fs (loop0): Test dummy encryption mode enabled [ 688.332572][T14689] EXT4-fs (loop5): Test dummy encryption mode enabled [ 688.350447][T14699] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 688.363904][T14710] EXT4-fs (loop0): bad geometry: block count 1600 exceeds size of device (64 blocks) 10:58:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 688.378330][T14689] EXT4-fs (loop5): inodes count not valid: 786464 vs 32 [ 688.386983][T14721] loop2: detected capacity change from 512 to 0 10:58:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004007000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 688.445467][T14694] loop4: detected capacity change from 512 to 0 10:58:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000d004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 688.495267][T14721] EXT4-fs (loop2): Test dummy encryption mode enabled [ 688.502293][T14721] EXT4-fs (loop2): bad geometry: block count 1179712 exceeds size of device (64 blocks) [ 688.513074][T14729] loop3: detected capacity change from 512 to 0 [ 688.555362][T14694] EXT4-fs (loop4): Test dummy encryption mode enabled [ 688.562429][T14694] EXT4-fs (loop4): inodes count not valid: 49020960 vs 32 [ 688.595914][T14729] EXT4-fs (loop3): Test dummy encryption mode enabled [ 688.602965][T14729] EXT4-fs (loop3): inodes count not valid: 7995424 vs 32 10:58:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000180003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 688.715304][T14741] loop0: detected capacity change from 512 to 0 [ 688.723427][T14742] loop1: detected capacity change from 530 to 0 [ 688.785844][T14745] loop5: detected capacity change from 512 to 0 [ 688.792970][T14729] loop3: detected capacity change from 512 to 0 [ 688.794812][T14741] EXT4-fs (loop0): Test dummy encryption mode enabled [ 688.814142][T14745] EXT4-fs (loop5): Test dummy encryption mode enabled [ 688.829780][T14741] EXT4-fs (loop0): bad geometry: block count 1856 exceeds size of device (64 blocks) [ 688.832325][T14742] EXT4-fs (loop1): Test dummy encryption mode enabled [ 688.842867][T14745] EXT4-fs (loop5): inodes count not valid: 852000 vs 32 10:58:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000e004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004008000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 688.922664][T14760] loop2: detected capacity change from 512 to 0 [ 688.923465][T14742] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 688.945807][T14761] loop4: detected capacity change from 512 to 0 [ 688.957932][T14760] EXT4-fs (loop2): Test dummy encryption mode enabled 10:58:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200089004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 688.965008][T14760] EXT4-fs (loop2): bad geometry: block count 1572928 exceeds size of device (64 blocks) 10:58:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x60020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 688.995418][T14761] EXT4-fs (loop4): Test dummy encryption mode enabled [ 689.009466][T14761] EXT4-fs (loop4): inodes count not valid: 50331680 vs 32 [ 689.086284][T14773] loop5: detected capacity change from 512 to 0 [ 689.165071][T14777] loop0: detected capacity change from 512 to 0 [ 689.172405][T14773] EXT4-fs (loop5): Test dummy encryption mode enabled [ 689.184746][T14783] loop3: detected capacity change from 512 to 0 [ 689.195251][T14783] EXT4-fs (loop3): Test dummy encryption mode enabled [ 689.202512][T14783] EXT4-fs (loop3): inodes count not valid: 8978464 vs 32 10:58:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000190003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 689.209470][T14773] EXT4-fs (loop5): inodes count not valid: 917536 vs 32 [ 689.220147][T14777] EXT4-fs (loop0): Test dummy encryption mode enabled [ 689.227103][T14761] loop4: detected capacity change from 512 to 0 [ 689.237318][T14777] EXT4-fs (loop0): bad geometry: block count 2112 exceeds size of device (64 blocks) [ 689.277210][T14761] EXT4-fs (loop4): Test dummy encryption mode enabled [ 689.286054][T14761] EXT4-fs (loop4): inodes count not valid: 50331680 vs 32 [ 689.302934][T14793] loop1: detected capacity change from 264192 to 0 10:58:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20003a034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 689.385245][T14773] loop5: detected capacity change from 512 to 0 [ 689.393672][T14793] EXT4-fs (loop1): Test dummy encryption mode enabled [ 689.407253][T14783] loop3: detected capacity change from 512 to 0 [ 689.419309][T14793] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004009000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 689.438602][T14799] loop2: detected capacity change from 512 to 0 [ 689.448111][T14799] EXT4-fs (loop2): Test dummy encryption mode enabled [ 689.458351][T14773] EXT4-fs (loop5): Test dummy encryption mode enabled [ 689.465563][T14783] EXT4-fs (loop3): Test dummy encryption mode enabled [ 689.467253][T14799] EXT4-fs (loop2): bad geometry: block count 1638464 exceeds size of device (64 blocks) 10:58:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40048, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000210003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 689.494482][T14783] EXT4-fs (loop3): inodes count not valid: 8978464 vs 32 [ 689.503760][T14773] EXT4-fs (loop5): inodes count not valid: 917536 vs 32 [ 689.534113][T14814] loop4: detected capacity change from 512 to 0 10:58:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20029d004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000f004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 689.664916][T14817] loop0: detected capacity change from 512 to 0 [ 689.673568][T14814] EXT4-fs (loop4): Test dummy encryption mode enabled [ 689.681075][T14814] EXT4-fs (loop4): inodes count not valid: 54132768 vs 32 [ 689.805602][T14824] loop2: detected capacity change from 512 to 0 [ 689.814002][T14824] EXT4-fs (loop2): Test dummy encryption mode enabled [ 689.814736][T14817] EXT4-fs (loop0): Test dummy encryption mode enabled [ 689.827856][T14824] EXT4-fs (loop2): bad geometry: block count 2162752 exceeds size of device (64 blocks) [ 689.859472][T14817] EXT4-fs (loop0): bad geometry: block count 2368 exceeds size of device (64 blocks) [ 689.887730][T14828] loop1: detected capacity change from 512 to 0 [ 689.900508][T14834] loop3: detected capacity change from 512 to 0 [ 689.910431][T14835] loop5: detected capacity change from 512 to 0 [ 689.935350][T14814] loop4: detected capacity change from 512 to 0 [ 689.935585][T14828] EXT4-fs (loop1): Test dummy encryption mode enabled [ 689.952429][T14835] EXT4-fs (loop5): Test dummy encryption mode enabled [ 689.961659][T14834] EXT4-fs (loop3): Test dummy encryption mode enabled [ 689.971811][T14835] EXT4-fs (loop5): inodes count not valid: 983072 vs 32 [ 689.978268][T14828] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 689.993045][T14814] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400a000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000250003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 690.010099][T14834] EXT4-fs (loop3): inodes count not valid: 10289696 vs 32 [ 690.024248][T14814] EXT4-fs (loop4): inodes count not valid: 54132768 vs 32 10:58:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40032, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200045034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 690.158447][T14835] loop5: detected capacity change from 512 to 0 10:58:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200410004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 690.227850][T14858] loop2: detected capacity change from 512 to 0 [ 690.246626][T14834] loop3: detected capacity change from 512 to 0 [ 690.254211][T14858] EXT4-fs (loop2): Test dummy encryption mode enabled [ 690.261896][T14858] EXT4-fs (loop2): bad geometry: block count 2424896 exceeds size of device (64 blocks) [ 690.305506][T14834] EXT4-fs (loop3): Test dummy encryption mode enabled [ 690.306958][T14859] loop0: detected capacity change from 512 to 0 [ 690.327040][T14834] EXT4-fs (loop3): inodes count not valid: 10289696 vs 32 10:58:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a0004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 690.379316][T14859] EXT4-fs (loop0): Test dummy encryption mode enabled [ 690.386355][T14859] EXT4-fs (loop0): bad geometry: block count 2624 exceeds size of device (64 blocks) 10:58:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040002e0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 690.433448][T14866] loop4: detected capacity change from 512 to 0 [ 690.476180][T14874] loop1: detected capacity change from 512 to 0 [ 690.567006][T14866] EXT4-fs (loop4): Test dummy encryption mode enabled [ 690.575707][T14874] EXT4-fs (loop1): Test dummy encryption mode enabled [ 690.587440][T14871] loop5: detected capacity change from 512 to 0 [ 690.613773][T14866] EXT4-fs (loop4): inodes count not valid: 54853664 vs 32 [ 690.629623][T14874] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 690.643053][T14871] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400b000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 690.662043][T14893] loop3: detected capacity change from 512 to 0 [ 690.674102][T14871] EXT4-fs (loop5): inodes count not valid: 1049632 vs 32 [ 690.676925][T14893] EXT4-fs (loop3): Test dummy encryption mode enabled [ 690.688012][T14890] loop2: detected capacity change from 512 to 0 [ 690.694504][T14893] EXT4-fs (loop3): inodes count not valid: 10485792 vs 32 [ 690.805110][T14890] EXT4-fs (loop2): Test dummy encryption mode enabled [ 690.812436][T14890] EXT4-fs (loop2): bad geometry: block count 3014720 exceeds size of device (64 blocks) 10:58:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="202010004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2001a0004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 690.854784][T14900] loop0: detected capacity change from 512 to 0 [ 690.864073][T14900] EXT4-fs (loop0): Test dummy encryption mode enabled [ 690.881179][T14866] loop4: detected capacity change from 512 to 0 [ 690.918439][T14900] EXT4-fs (loop0): bad geometry: block count 2880 exceeds size of device (64 blocks) [ 690.938273][T14866] EXT4-fs (loop4): Test dummy encryption mode enabled [ 690.946310][T14866] EXT4-fs (loop4): inodes count not valid: 54853664 vs 32 10:58:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20004d034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000480003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400c000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 691.110636][T14918] loop5: detected capacity change from 512 to 0 [ 691.119776][T14918] EXT4-fs (loop5): Test dummy encryption mode enabled [ 691.121546][T14917] loop1: detected capacity change from 526 to 0 [ 691.137890][T14918] EXT4-fs (loop5): inodes count not valid: 1056800 vs 32 [ 691.137948][T14912] loop3: detected capacity change from 512 to 0 [ 691.186554][T14927] loop2: detected capacity change from 512 to 0 [ 691.225032][T14912] EXT4-fs (loop3): Test dummy encryption mode enabled [ 691.225133][T14930] loop4: detected capacity change from 512 to 0 [ 691.234150][T14912] EXT4-fs (loop3): inodes count not valid: 10486048 vs 32 [ 691.244711][T14917] EXT4-fs (loop1): Test dummy encryption mode enabled [ 691.255988][T14927] EXT4-fs (loop2): Test dummy encryption mode enabled [ 691.267675][T14918] loop5: detected capacity change from 512 to 0 [ 691.274948][T14930] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200011004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 691.276717][T14918] EXT4-fs (loop5): Test dummy encryption mode enabled [ 691.290262][T14927] EXT4-fs (loop2): bad geometry: block count 4718656 exceeds size of device (64 blocks) [ 691.300078][T14918] EXT4-fs (loop5): inodes count not valid: 1056800 vs 32 [ 691.304501][T14917] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 691.322986][T14930] EXT4-fs (loop4): inodes count not valid: 55377952 vs 32 [ 691.454771][T14941] loop0: detected capacity change from 512 to 0 [ 691.478381][T14941] EXT4-fs (loop0): Test dummy encryption mode enabled 10:58:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="180000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040004c0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 691.502486][T14941] EXT4-fs (loop0): bad geometry: block count 3136 exceeds size of device (64 blocks) [ 691.519434][T14912] loop3: detected capacity change from 512 to 0 [ 691.530428][T14952] loop5: detected capacity change from 512 to 0 [ 691.543472][T14930] loop4: detected capacity change from 512 to 0 [ 691.553167][T14912] EXT4-fs (loop3): Test dummy encryption mode enabled [ 691.561485][T14912] EXT4-fs (loop3): inodes count not valid: 10486048 vs 32 [ 691.594938][T14952] EXT4-fs (loop5): Test dummy encryption mode enabled [ 691.602358][T14952] EXT4-fs (loop5): inodes count not valid: 1114144 vs 32 10:58:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a1004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 691.637340][T14930] EXT4-fs (loop4): Test dummy encryption mode enabled [ 691.644702][T14930] EXT4-fs (loop4): inodes count not valid: 55377952 vs 32 10:58:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400d000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a5034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 691.788444][T14962] loop2: detected capacity change from 512 to 0 [ 691.845698][T14952] loop5: detected capacity change from 512 to 0 [ 691.886857][T14962] EXT4-fs (loop2): Test dummy encryption mode enabled [ 691.888301][T14971] loop1: detected capacity change from 512 to 0 [ 691.893879][T14962] EXT4-fs (loop2): bad geometry: block count 4980800 exceeds size of device (64 blocks) [ 691.912268][T14952] EXT4-fs (loop5): Test dummy encryption mode enabled [ 691.920886][T14952] EXT4-fs (loop5): inodes count not valid: 1114144 vs 32 [ 691.921004][T14974] loop0: detected capacity change from 512 to 0 10:58:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200012004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 691.995714][T14971] EXT4-fs (loop1): Test dummy encryption mode enabled [ 692.002888][T14971] EXT4-fs (loop1): inodes count not valid: 24 vs 32 [ 692.033275][T14982] loop3: detected capacity change from 512 to 0 10:58:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040005c0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 692.045249][T14974] EXT4-fs (loop0): Test dummy encryption mode enabled [ 692.054912][T14974] EXT4-fs (loop0): bad geometry: block count 3392 exceeds size of device (64 blocks) [ 692.134834][T14982] EXT4-fs (loop3): Test dummy encryption mode enabled [ 692.141882][T14982] EXT4-fs (loop3): inodes count not valid: 10551328 vs 32 [ 692.165064][T14989] loop4: detected capacity change from 512 to 0 10:58:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40018, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 692.225457][T14989] EXT4-fs (loop4): Test dummy encryption mode enabled [ 692.232664][T14998] loop5: detected capacity change from 512 to 0 [ 692.241342][T14999] loop2: detected capacity change from 512 to 0 [ 692.241718][T14989] EXT4-fs (loop4): inodes count not valid: 61145120 vs 32 [ 692.266860][T14982] loop3: detected capacity change from 512 to 0 10:58:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400e000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 692.277697][T14999] EXT4-fs (loop2): Test dummy encryption mode enabled [ 692.286138][T14998] EXT4-fs (loop5): Test dummy encryption mode enabled [ 692.299324][T14982] EXT4-fs (loop3): Test dummy encryption mode enabled [ 692.320833][T14999] EXT4-fs (loop2): bad geometry: block count 6029376 exceeds size of device (64 blocks) [ 692.342042][T14998] EXT4-fs (loop5): inodes count not valid: 1179680 vs 32 [ 692.344338][T14982] EXT4-fs (loop3): inodes count not valid: 10551328 vs 32 10:58:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2002a1004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 692.463900][T15013] loop0: detected capacity change from 512 to 0 [ 692.472563][T15011] loop1: detected capacity change from 512 to 0 [ 692.490389][T14989] loop4: detected capacity change from 512 to 0 [ 692.504104][T15013] EXT4-fs (loop0): Test dummy encryption mode enabled 10:58:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000600003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 692.518722][T15013] EXT4-fs (loop0): bad geometry: block count 3648 exceeds size of device (64 blocks) [ 692.537850][T14998] loop5: detected capacity change from 512 to 0 [ 692.546603][T15011] EXT4-fs (loop1): Test dummy encryption mode enabled [ 692.553839][T14989] EXT4-fs (loop4): Test dummy encryption mode enabled [ 692.565894][T14989] EXT4-fs (loop4): inodes count not valid: 61145120 vs 32 [ 692.578167][T15011] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 692.592850][T14998] EXT4-fs (loop5): Test dummy encryption mode enabled [ 692.601204][T14998] EXT4-fs (loop5): inodes count not valid: 1179680 vs 32 10:58:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f0034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41200, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 692.624528][T15029] loop3: detected capacity change from 512 to 0 [ 692.640753][T15033] loop2: detected capacity change from 512 to 0 10:58:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400f000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200115004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 692.724990][T15029] EXT4-fs (loop3): Test dummy encryption mode enabled [ 692.725025][T15033] EXT4-fs (loop2): Test dummy encryption mode enabled [ 692.741044][T15029] EXT4-fs (loop3): inodes count not valid: 10551840 vs 32 [ 692.749877][T15033] EXT4-fs (loop2): bad geometry: block count 6291520 exceeds size of device (64 blocks) [ 692.914713][T15045] loop4: detected capacity change from 512 to 0 [ 692.923316][T15044] loop0: detected capacity change from 512 to 0 [ 692.942566][T15049] loop1: detected capacity change from 521 to 0 [ 692.966312][T15049] EXT4-fs (loop1): Test dummy encryption mode enabled [ 692.974832][T15045] EXT4-fs (loop4): Test dummy encryption mode enabled [ 692.982146][T15045] EXT4-fs (loop4): inodes count not valid: 66060320 vs 32 [ 693.001766][T15059] loop5: detected capacity change from 512 to 0 [ 693.010347][T15049] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 693.010392][T15044] EXT4-fs (loop0): Test dummy encryption mode enabled [ 693.041194][T15044] EXT4-fs (loop0): bad geometry: block count 3904 exceeds size of device (64 blocks) [ 693.042961][T15029] loop3: detected capacity change from 512 to 0 10:58:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000680003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f8034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 693.079754][T15059] EXT4-fs (loop5): Test dummy encryption mode enabled [ 693.094224][T15059] EXT4-fs (loop5): inodes count not valid: 1376544 vs 32 10:58:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x28000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a2004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004010000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 693.344902][T15059] loop5: detected capacity change from 512 to 0 [ 693.352697][T15059] EXT4-fs (loop5): Test dummy encryption mode enabled [ 693.361748][T15059] EXT4-fs (loop5): inodes count not valid: 1376544 vs 32 [ 693.362256][T15073] loop2: detected capacity change from 512 to 0 10:58:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20a515004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 693.424716][T15073] EXT4-fs (loop2): Test dummy encryption mode enabled [ 693.444118][T15073] EXT4-fs (loop2): bad geometry: block count 6815808 exceeds size of device (64 blocks) [ 693.465528][T15084] loop3: detected capacity change from 512 to 0 [ 693.479122][T15088] loop1: detected capacity change from 264192 to 0 [ 693.486284][T15089] loop4: detected capacity change from 512 to 0 [ 693.493211][T15085] loop0: detected capacity change from 512 to 0 [ 693.525459][T15084] EXT4-fs (loop3): Test dummy encryption mode enabled [ 693.532709][T15084] EXT4-fs (loop3): inodes count not valid: 10616864 vs 32 [ 693.565348][T15089] EXT4-fs (loop4): Test dummy encryption mode enabled [ 693.565497][T15088] EXT4-fs (loop1): Test dummy encryption mode enabled [ 693.579817][T15085] EXT4-fs (loop0): Test dummy encryption mode enabled [ 693.595896][T15084] loop3: detected capacity change from 512 to 0 [ 693.610343][T15085] EXT4-fs (loop0): bad geometry: block count 4160 exceeds size of device (64 blocks) 10:58:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040006c0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 693.619668][T15084] EXT4-fs (loop3): Test dummy encryption mode enabled [ 693.628122][T15088] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 693.628664][T15089] EXT4-fs (loop4): inodes count not valid: 66584608 vs 32 [ 693.657618][T15106] loop5: detected capacity change from 512 to 0 10:58:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2001a2004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 693.683315][T15084] EXT4-fs (loop3): inodes count not valid: 10616864 vs 32 [ 693.694462][T15106] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200002044000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 693.737760][T15106] EXT4-fs (loop5): inodes count not valid: 1418528 vs 32 10:58:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004011000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 693.819174][T15110] loop2: detected capacity change from 512 to 0 [ 693.875538][T15116] loop1: detected capacity change from 264192 to 0 [ 693.888521][T15110] EXT4-fs (loop2): Test dummy encryption mode enabled [ 693.895862][T15110] EXT4-fs (loop2): bad geometry: block count 7077952 exceeds size of device (64 blocks) [ 693.936591][T15125] loop0: detected capacity change from 512 to 0 [ 693.983930][T15127] loop4: detected capacity change from 512 to 0 [ 693.992803][T15127] EXT4-fs (loop4): Test dummy encryption mode enabled [ 694.000120][T15116] EXT4-fs (loop1): Test dummy encryption mode enabled [ 694.011686][T15127] EXT4-fs (loop4): inodes count not valid: 67239968 vs 32 [ 694.015481][T15113] loop3: detected capacity change from 512 to 0 10:58:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20a615004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000740003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 694.030437][T15125] EXT4-fs (loop0): Test dummy encryption mode enabled [ 694.041313][T15125] EXT4-fs (loop0): bad geometry: block count 4416 exceeds size of device (64 blocks) [ 694.053848][T15116] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a3004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 694.289990][T15127] loop4: detected capacity change from 512 to 0 [ 694.297129][T15146] loop5: detected capacity change from 512 to 0 [ 694.318571][T15145] loop2: detected capacity change from 512 to 0 10:58:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004012000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 694.335890][T15127] EXT4-fs (loop4): Test dummy encryption mode enabled [ 694.348673][T15127] EXT4-fs (loop4): inodes count not valid: 67239968 vs 32 [ 694.374989][T15146] EXT4-fs (loop5): Test dummy encryption mode enabled [ 694.375107][T15145] EXT4-fs (loop2): Test dummy encryption mode enabled 10:58:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200006044000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 694.396058][T15145] EXT4-fs (loop2): bad geometry: block count 7602240 exceeds size of device (64 blocks) [ 694.406888][T15146] EXT4-fs (loop5): inodes count not valid: 1418784 vs 32 [ 694.465442][T15158] loop3: detected capacity change from 512 to 0 [ 694.494988][T15161] loop0: detected capacity change from 512 to 0 [ 694.513633][T15167] loop1: detected capacity change from 520 to 0 [ 694.527838][T15158] EXT4-fs (loop3): Test dummy encryption mode enabled [ 694.543361][T15146] loop5: detected capacity change from 512 to 0 [ 694.565567][T15161] EXT4-fs (loop0): Test dummy encryption mode enabled [ 694.574408][T15158] EXT4-fs (loop3): inodes count not valid: 10682400 vs 32 [ 694.583130][T15167] EXT4-fs (loop1): Test dummy encryption mode enabled [ 694.586961][T15161] EXT4-fs (loop0): bad geometry: block count 4672 exceeds size of device (64 blocks) [ 694.608933][T15146] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000790003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 694.616560][T15146] EXT4-fs (loop5): inodes count not valid: 1418784 vs 32 [ 694.623939][T15158] loop3: detected capacity change from 512 to 0 [ 694.635110][T15167] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 694.649565][T15158] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004018000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 694.665480][T15158] EXT4-fs (loop3): inodes count not valid: 10682400 vs 32 10:58:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200018004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200010044000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a4004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 694.955762][T15187] loop2: detected capacity change from 512 to 0 [ 694.964375][T15189] loop0: detected capacity change from 512 to 0 [ 695.014749][T15193] loop4: detected capacity change from 512 to 0 [ 695.029915][T15187] EXT4-fs (loop2): Test dummy encryption mode enabled [ 695.034640][T15189] EXT4-fs (loop0): Test dummy encryption mode enabled [ 695.048929][T15189] EXT4-fs (loop0): bad geometry: block count 6208 exceeds size of device (64 blocks) [ 695.055562][T15193] EXT4-fs (loop4): Test dummy encryption mode enabled [ 695.065827][T15187] EXT4-fs (loop2): bad geometry: block count 7929920 exceeds size of device (64 blocks) [ 695.080486][T15203] loop1: detected capacity change from 512 to 0 [ 695.099944][T15193] EXT4-fs (loop4): inodes count not valid: 68157472 vs 32 [ 695.194270][T15209] loop5: detected capacity change from 512 to 0 [ 695.195684][T15203] EXT4-fs (loop1): Test dummy encryption mode enabled [ 695.209300][T15210] loop3: detected capacity change from 512 to 0 [ 695.213758][T15209] EXT4-fs (loop5): Test dummy encryption mode enabled [ 695.226644][T15203] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040007a0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 695.245284][T15210] EXT4-fs (loop3): Test dummy encryption mode enabled [ 695.255375][T15193] loop4: detected capacity change from 512 to 0 [ 695.261858][T15210] EXT4-fs (loop3): inodes count not valid: 10747936 vs 32 [ 695.269355][T15209] EXT4-fs (loop5): inodes count not valid: 1572896 vs 32 [ 695.269623][T15193] EXT4-fs (loop4): Test dummy encryption mode enabled [ 695.283460][T15193] EXT4-fs (loop4): inodes count not valid: 68157472 vs 32 10:58:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004021000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000054000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 695.425016][T15228] loop0: detected capacity change from 512 to 0 [ 695.433613][T15231] loop2: detected capacity change from 512 to 0 [ 695.443972][T15232] loop4: detected capacity change from 512 to 0 [ 695.455486][T15209] loop5: detected capacity change from 512 to 0 [ 695.462398][T15228] EXT4-fs (loop0): Test dummy encryption mode enabled [ 695.471069][T15210] loop3: detected capacity change from 512 to 0 [ 695.478965][T15228] EXT4-fs (loop0): bad geometry: block count 8512 exceeds size of device (64 blocks) [ 695.489617][T15238] loop1: detected capacity change from 512 to 0 [ 695.498581][T15231] EXT4-fs (loop2): Test dummy encryption mode enabled [ 695.506650][T15209] EXT4-fs (loop5): Test dummy encryption mode enabled [ 695.514110][T15232] EXT4-fs (loop4): Test dummy encryption mode enabled [ 695.525190][T15210] EXT4-fs (loop3): Test dummy encryption mode enabled [ 695.532224][T15209] EXT4-fs (loop5): inodes count not valid: 1572896 vs 32 [ 695.541077][T15232] EXT4-fs (loop4): inodes count not valid: 83886112 vs 32 [ 695.550495][T15231] EXT4-fs (loop2): bad geometry: block count 7995456 exceeds size of device (64 blocks) [ 695.561295][T15238] EXT4-fs (loop1): Test dummy encryption mode enabled [ 695.574740][T15210] EXT4-fs (loop3): inodes count not valid: 10747936 vs 32 [ 695.583153][T15238] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004025000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20001f004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2003a5004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000064000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000890003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 695.924598][T15256] loop0: detected capacity change from 512 to 0 [ 695.949059][T15256] EXT4-fs (loop0): Test dummy encryption mode enabled [ 695.959085][T15256] EXT4-fs (loop0): bad geometry: block count 9536 exceeds size of device (64 blocks) 10:58:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000402e000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 696.006568][T15269] loop1: detected capacity change from 34816 to 0 [ 696.019797][T15270] loop4: detected capacity change from 512 to 0 [ 696.038355][T15271] loop3: detected capacity change from 512 to 0 [ 696.048503][T15269] EXT4-fs (loop1): Test dummy encryption mode enabled [ 696.049491][T15272] loop5: detected capacity change from 512 to 0 [ 696.062892][T15269] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 696.078235][T15272] EXT4-fs (loop5): Test dummy encryption mode enabled [ 696.086908][T15270] EXT4-fs (loop4): Test dummy encryption mode enabled [ 696.094357][T15271] EXT4-fs (loop3): Test dummy encryption mode enabled [ 696.112099][T15288] loop0: detected capacity change from 512 to 0 [ 696.122227][T15288] EXT4-fs (loop0): Test dummy encryption mode enabled [ 696.122381][T15270] EXT4-fs (loop4): inodes count not valid: 100663328 vs 32 [ 696.138610][T15271] EXT4-fs (loop3): inodes count not valid: 10814240 vs 32 [ 696.145790][T15272] EXT4-fs (loop5): inodes count not valid: 2031648 vs 32 10:58:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 696.153620][T15288] EXT4-fs (loop0): bad geometry: block count 11840 exceeds size of device (64 blocks) 10:58:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 696.327625][T15291] loop2: detected capacity change from 512 to 0 [ 696.335597][T15291] EXT4-fs (loop2): Test dummy encryption mode enabled [ 696.342781][T15291] EXT4-fs (loop2): bad geometry: block count 8978496 exceeds size of device (64 blocks) [ 696.388858][T15271] loop3: detected capacity change from 512 to 0 [ 696.417835][T15270] loop4: detected capacity change from 512 to 0 [ 696.428935][T15271] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000a00103000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004031000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 696.447705][T15271] EXT4-fs (loop3): inodes count not valid: 10814240 vs 32 [ 696.472980][T15270] EXT4-fs (loop4): Test dummy encryption mode enabled [ 696.485176][T15308] loop5: detected capacity change from 512 to 0 [ 696.493480][T15309] loop1: detected capacity change from 515 to 0 [ 696.505306][T15270] EXT4-fs (loop4): inodes count not valid: 100663328 vs 32 10:58:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2001b3004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 696.556666][T15313] loop2: detected capacity change from 512 to 0 [ 696.564183][T15309] EXT4-fs (loop1): Test dummy encryption mode enabled [ 696.564234][T15308] EXT4-fs (loop5): Test dummy encryption mode enabled [ 696.571625][T15318] loop0: detected capacity change from 512 to 0 [ 696.592249][T15309] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004064000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 696.609598][T15308] EXT4-fs (loop5): inodes count not valid: 2097184 vs 32 10:58:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 696.694656][T15313] EXT4-fs (loop2): Test dummy encryption mode enabled [ 696.701700][T15318] EXT4-fs (loop0): Test dummy encryption mode enabled [ 696.708995][T15313] EXT4-fs (loop2): bad geometry: block count 27263040 exceeds size of device (64 blocks) [ 696.720568][T15318] EXT4-fs (loop0): bad geometry: block count 12608 exceeds size of device (64 blocks) [ 696.977487][T15308] loop5: detected capacity change from 512 to 0 [ 697.007548][T15332] loop4: detected capacity change from 512 to 0 [ 697.021149][T15308] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004032000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000f80103000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 697.050190][T15308] EXT4-fs (loop5): inodes count not valid: 2097184 vs 32 [ 697.057670][T15332] EXT4-fs (loop4): Test dummy encryption mode enabled [ 697.070176][T15342] loop1: detected capacity change from 32768 to 0 [ 697.079981][T15332] EXT4-fs (loop4): inodes count not valid: 100925472 vs 32 [ 697.097878][T15343] loop3: detected capacity change from 512 to 0 10:58:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="201020004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 697.149736][T15348] loop0: detected capacity change from 512 to 0 [ 697.194727][T15351] loop2: detected capacity change from 512 to 0 [ 697.201864][T15343] EXT4-fs (loop3): Test dummy encryption mode enabled [ 697.211056][T15348] EXT4-fs (loop0): Test dummy encryption mode enabled [ 697.211128][T15342] EXT4-fs (loop1): Test dummy encryption mode enabled [ 697.234059][T15343] EXT4-fs (loop3): inodes count not valid: 11731232 vs 32 [ 697.252441][T15348] EXT4-fs (loop0): bad geometry: block count 12864 exceeds size of device (64 blocks) [ 697.263576][T15351] EXT4-fs (loop2): Test dummy encryption mode enabled [ 697.275984][T15342] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 697.288681][T15351] EXT4-fs (loop2): bad geometry: block count 33030208 exceeds size of device (64 blocks) [ 697.325305][T15332] loop4: detected capacity change from 512 to 0 [ 697.364874][T15363] loop5: detected capacity change from 512 to 0 10:58:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 697.376686][T15343] loop3: detected capacity change from 512 to 0 [ 697.401142][T15332] EXT4-fs (loop4): Test dummy encryption mode enabled [ 697.410439][T15363] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000403d000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 697.422566][T15343] EXT4-fs (loop3): Test dummy encryption mode enabled [ 697.436690][T15363] EXT4-fs (loop5): inodes count not valid: 2101280 vs 32 [ 697.445893][T15332] EXT4-fs (loop4): inodes count not valid: 100925472 vs 32 10:58:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000040203000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 697.484602][T15343] EXT4-fs (loop3): inodes count not valid: 11731232 vs 32 10:58:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000074000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2002c3004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 697.644183][T15378] loop1: detected capacity change from 514 to 0 [ 697.694624][T15381] loop0: detected capacity change from 512 to 0 [ 697.734483][T15363] loop5: detected capacity change from 512 to 0 [ 697.747481][T15381] EXT4-fs (loop0): Test dummy encryption mode enabled [ 697.747621][T15378] EXT4-fs (loop1): Test dummy encryption mode enabled [ 697.768214][T15381] EXT4-fs (loop0): bad geometry: block count 15680 exceeds size of device (64 blocks) [ 697.780231][T15378] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 697.793394][T15389] loop2: detected capacity change from 512 to 0 10:58:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200021004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="201020004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 697.904982][T15389] EXT4-fs (loop2): Test dummy encryption mode enabled [ 697.911976][T15398] loop4: detected capacity change from 512 to 0 [ 697.912133][T15389] EXT4-fs (loop2): bad geometry: block count 33816640 exceeds size of device (64 blocks) [ 697.949486][T15399] loop3: detected capacity change from 512 to 0 [ 697.974689][T15398] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004041000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 697.997368][T15408] loop5: detected capacity change from 512 to 0 [ 698.004432][T15399] EXT4-fs (loop3): Test dummy encryption mode enabled [ 698.013897][T15408] EXT4-fs (loop5): Test dummy encryption mode enabled [ 698.021073][T15399] EXT4-fs (loop3): inodes count not valid: 12780064 vs 32 [ 698.037425][T15398] EXT4-fs (loop4): inodes count not valid: 117440544 vs 32 10:58:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040005f0203000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 698.066011][T15408] EXT4-fs (loop5): inodes count not valid: 2162720 vs 32 [ 698.315534][T15416] loop1: detected capacity change from 512 to 0 [ 698.323199][T15399] loop3: detected capacity change from 512 to 0 [ 698.332913][T15424] loop2: detected capacity change from 512 to 0 [ 698.354871][T15416] EXT4-fs (loop1): Test dummy encryption mode enabled [ 698.366966][T15416] EXT4-fs (loop1): inodes count not valid: 2101280 vs 32 [ 698.374783][T15398] loop4: detected capacity change from 512 to 0 [ 698.381642][T15420] loop0: detected capacity change from 512 to 0 [ 698.404412][T15424] EXT4-fs (loop2): Test dummy encryption mode enabled 10:58:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2002e0004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 698.415907][T15408] loop5: detected capacity change from 512 to 0 [ 698.423238][T15408] EXT4-fs (loop5): Test dummy encryption mode enabled [ 698.428062][T15398] EXT4-fs (loop4): Test dummy encryption mode enabled [ 698.441942][T15408] EXT4-fs (loop5): inodes count not valid: 2162720 vs 32 10:58:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x12, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 698.464963][T15424] EXT4-fs (loop2): bad geometry: block count 39780416 exceeds size of device (64 blocks) [ 698.465276][T15420] EXT4-fs (loop0): Test dummy encryption mode enabled [ 698.487762][T15398] EXT4-fs (loop4): inodes count not valid: 117440544 vs 32 [ 698.495234][T15420] EXT4-fs (loop0): bad geometry: block count 16704 exceeds size of device (64 blocks) 10:58:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200025004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000094000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 698.744627][T15441] loop3: detected capacity change from 512 to 0 [ 698.753589][T15445] loop1: detected capacity change from 512 to 0 [ 698.784744][T15441] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000303000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004048000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 698.793203][T15441] EXT4-fs (loop3): inodes count not valid: 14680608 vs 32 [ 698.826575][T15445] EXT4-fs (loop1): Test dummy encryption mode enabled [ 698.843453][T15445] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40406, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 698.925721][T15457] loop5: detected capacity change from 512 to 0 [ 698.939641][T15457] EXT4-fs (loop5): Test dummy encryption mode enabled [ 698.948175][T15457] EXT4-fs (loop5): inodes count not valid: 2424864 vs 32 [ 698.960899][T15441] loop3: detected capacity change from 512 to 0 [ 699.004791][T15441] EXT4-fs (loop3): Test dummy encryption mode enabled [ 699.012098][T15469] loop4: detected capacity change from 512 to 0 [ 699.026472][T15441] EXT4-fs (loop3): inodes count not valid: 14680608 vs 32 [ 699.037317][T15466] loop0: detected capacity change from 512 to 0 [ 699.046156][T15470] loop2: detected capacity change from 512 to 0 [ 699.094287][T15457] loop5: detected capacity change from 512 to 0 [ 699.102533][T15469] EXT4-fs (loop4): Test dummy encryption mode enabled [ 699.115299][T15469] EXT4-fs (loop4): inodes count not valid: 150994976 vs 32 [ 699.124575][T15470] EXT4-fs (loop2): Test dummy encryption mode enabled [ 699.131797][T15470] EXT4-fs (loop2): bad geometry: block count 50331712 exceeds size of device (64 blocks) 10:58:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2001e9004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 699.155599][T15466] EXT4-fs (loop0): Test dummy encryption mode enabled [ 699.166498][T15466] EXT4-fs (loop0): bad geometry: block count 18496 exceeds size of device (64 blocks) 10:58:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20002e004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 699.203790][T15483] loop1: detected capacity change from 514 to 0 10:58:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000020403000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 699.334701][T15483] EXT4-fs (loop1): Test dummy encryption mode enabled [ 699.343402][T15483] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f801, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004049000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 699.453713][T15469] loop4: detected capacity change from 512 to 0 [ 699.476678][T15493] loop3: detected capacity change from 512 to 0 [ 699.499191][T15497] loop2: detected capacity change from 512 to 0 [ 699.509080][T15469] EXT4-fs (loop4): Test dummy encryption mode enabled [ 699.525658][T15469] EXT4-fs (loop4): inodes count not valid: 150994976 vs 32 10:58:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000a4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 699.553770][T15493] EXT4-fs (loop3): Test dummy encryption mode enabled [ 699.561431][T15493] EXT4-fs (loop3): inodes count not valid: 15270176 vs 32 [ 699.575032][T15504] loop5: detected capacity change from 512 to 0 [ 699.610742][T15497] EXT4-fs (loop2): Test dummy encryption mode enabled [ 699.626154][T15511] loop0: detected capacity change from 512 to 0 [ 699.639443][T15497] EXT4-fs (loop2): bad geometry: block count 67240000 exceeds size of device (64 blocks) [ 699.684664][T15504] EXT4-fs (loop5): Test dummy encryption mode enabled [ 699.692753][T15504] EXT4-fs (loop5): inodes count not valid: 3014688 vs 32 [ 699.724382][T15511] EXT4-fs (loop0): Test dummy encryption mode enabled 10:58:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2002ec004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 699.731311][T15517] loop1: detected capacity change from 636 to 0 [ 699.742566][T15511] EXT4-fs (loop0): bad geometry: block count 18752 exceeds size of device (64 blocks) [ 699.858253][T15517] EXT4-fs (loop1): Test dummy encryption mode enabled [ 699.867528][T15524] loop4: detected capacity change from 512 to 0 [ 699.885266][T15504] loop5: detected capacity change from 512 to 0 [ 699.893600][T15517] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000404c000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000060403000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 699.903368][T15531] loop3: detected capacity change from 512 to 0 [ 699.926632][T15524] EXT4-fs (loop4): Test dummy encryption mode enabled [ 699.942964][T15504] EXT4-fs (loop5): Test dummy encryption mode enabled [ 699.961373][T15531] EXT4-fs (loop3): Test dummy encryption mode enabled [ 699.972575][T15524] EXT4-fs (loop4): inodes count not valid: 167772192 vs 32 [ 699.987921][T15504] EXT4-fs (loop5): inodes count not valid: 3014688 vs 32 10:58:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4031f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200032004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000b4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 700.036116][T15531] EXT4-fs (loop3): inodes count not valid: 15467040 vs 32 [ 700.042440][T15544] loop2: detected capacity change from 512 to 0 [ 700.082219][T15542] loop0: detected capacity change from 512 to 0 [ 700.134608][T15544] EXT4-fs (loop2): Test dummy encryption mode enabled [ 700.142126][T15542] EXT4-fs (loop0): Test dummy encryption mode enabled [ 700.152561][T15542] EXT4-fs (loop0): bad geometry: block count 19520 exceeds size of device (64 blocks) [ 700.157499][T15544] EXT4-fs (loop2): bad geometry: block count 67502144 exceeds size of device (64 blocks) [ 700.297336][T15550] loop5: detected capacity change from 512 to 0 [ 700.306695][T15556] loop1: detected capacity change from 513 to 0 [ 700.367258][T15550] EXT4-fs (loop5): Test dummy encryption mode enabled [ 700.370837][T15531] loop3: detected capacity change from 512 to 0 [ 700.381030][T15556] EXT4-fs (loop1): Test dummy encryption mode enabled [ 700.390834][T15564] loop4: detected capacity change from 512 to 0 [ 700.392905][T15550] EXT4-fs (loop5): inodes count not valid: 3276832 vs 32 [ 700.403832][T15531] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004055000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000100403000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 700.413066][T15531] EXT4-fs (loop3): inodes count not valid: 15467040 vs 32 [ 700.423783][T15556] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 700.430190][T15564] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4e600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 700.498082][T15564] EXT4-fs (loop4): inodes count not valid: 184549408 vs 32 10:58:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2003f0004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 700.549956][T15550] loop5: detected capacity change from 512 to 0 [ 700.561153][T15550] EXT4-fs (loop5): Test dummy encryption mode enabled [ 700.571733][T15576] loop0: detected capacity change from 512 to 0 10:58:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000c4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 700.605958][T15550] EXT4-fs (loop5): inodes count not valid: 3276832 vs 32 [ 700.666900][T15576] EXT4-fs (loop0): Test dummy encryption mode enabled [ 700.671385][T15582] loop2: detected capacity change from 512 to 0 [ 700.673920][T15576] EXT4-fs (loop0): bad geometry: block count 21824 exceeds size of device (64 blocks) 10:58:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20013c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 700.765952][T15590] loop4: detected capacity change from 512 to 0 [ 700.766123][T15582] EXT4-fs (loop2): Test dummy encryption mode enabled [ 700.782512][T15582] EXT4-fs (loop2): bad geometry: block count 68157504 exceeds size of device (64 blocks) [ 700.826266][T15591] loop1: detected capacity change from 627 to 0 [ 700.870468][T15594] loop3: detected capacity change from 512 to 0 [ 700.887162][T15590] EXT4-fs (loop4): Test dummy encryption mode enabled [ 700.897474][T15590] EXT4-fs (loop4): inodes count not valid: 201326624 vs 32 [ 700.917057][T15591] EXT4-fs (loop1): Test dummy encryption mode enabled 10:58:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000d4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000405c000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000503000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 700.959851][T15594] EXT4-fs (loop3): Test dummy encryption mode enabled [ 700.996365][T15594] EXT4-fs (loop3): inodes count not valid: 15729440 vs 32 10:58:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4a503, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 701.030905][T15591] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 701.054829][T15609] loop5: detected capacity change from 512 to 0 [ 701.061763][T15613] loop4: detected capacity change from 512 to 0 [ 701.124869][T15609] EXT4-fs (loop5): Test dummy encryption mode enabled [ 701.127002][T15613] EXT4-fs (loop4): Test dummy encryption mode enabled [ 701.141787][T15613] EXT4-fs (loop4): inodes count not valid: 218103840 vs 32 [ 701.148411][T15609] EXT4-fs (loop5): inodes count not valid: 3932448 vs 32 [ 701.165225][T15621] loop2: detected capacity change from 512 to 0 10:58:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2001f8004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 701.183032][T15622] loop0: detected capacity change from 512 to 0 [ 701.277677][T15621] EXT4-fs (loop2): Test dummy encryption mode enabled [ 701.285411][T15622] EXT4-fs (loop0): Test dummy encryption mode enabled [ 701.292361][T15622] EXT4-fs (loop0): bad geometry: block count 23616 exceeds size of device (64 blocks) [ 701.317911][T15621] EXT4-fs (loop2): bad geometry: block count 83886144 exceeds size of device (64 blocks) [ 701.336586][T15609] loop5: detected capacity change from 512 to 0 [ 701.355663][T15613] loop4: detected capacity change from 512 to 0 10:58:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004060000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 701.371808][T15609] EXT4-fs (loop5): Test dummy encryption mode enabled [ 701.388657][T15609] EXT4-fs (loop5): inodes count not valid: 3932448 vs 32 [ 701.405660][T15613] EXT4-fs (loop4): Test dummy encryption mode enabled [ 701.406002][T15640] loop3: detected capacity change from 512 to 0 [ 701.412660][T15613] EXT4-fs (loop4): inodes count not valid: 218103840 vs 32 [ 701.421897][T15640] EXT4-fs (loop3): Test dummy encryption mode enabled [ 701.446015][T15640] EXT4-fs (loop3): inodes count not valid: 16253216 vs 32 10:58:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000603000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20003f004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 701.541451][T15641] loop1: detected capacity change from 594 to 0 10:58:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000e4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 701.667761][T15646] loop0: detected capacity change from 512 to 0 [ 701.676274][T15641] EXT4-fs (loop1): Test dummy encryption mode enabled [ 701.688842][T15640] loop3: detected capacity change from 512 to 0 [ 701.702288][T15641] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 701.720188][T15655] loop2: detected capacity change from 512 to 0 [ 701.728219][T15646] EXT4-fs (loop0): Test dummy encryption mode enabled [ 701.734655][T15640] EXT4-fs (loop3): Test dummy encryption mode enabled [ 701.742051][T15646] EXT4-fs (loop0): bad geometry: block count 24640 exceeds size of device (64 blocks) [ 701.742360][T15640] EXT4-fs (loop3): inodes count not valid: 16253216 vs 32 10:58:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4025d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004068000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 701.806299][T15655] EXT4-fs (loop2): Test dummy encryption mode enabled [ 701.813753][T15655] EXT4-fs (loop2): bad geometry: block count 100663360 exceeds size of device (64 blocks) [ 701.845701][T15665] loop4: detected capacity change from 512 to 0 10:58:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2003f8004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000040603000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 701.940677][T15665] EXT4-fs (loop4): Test dummy encryption mode enabled [ 701.967111][T15663] loop5: detected capacity change from 512 to 0 [ 701.967655][T15665] EXT4-fs (loop4): inodes count not valid: 234881056 vs 32 [ 702.044818][T15663] EXT4-fs (loop5): Test dummy encryption mode enabled [ 702.051796][T15663] EXT4-fs (loop5): inodes count not valid: 4128800 vs 32 [ 702.075489][T15678] loop1: detected capacity change from 513 to 0 [ 702.082482][T15681] loop3: detected capacity change from 512 to 0 10:58:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200040004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 702.096375][T15685] loop0: detected capacity change from 512 to 0 [ 702.145690][T15685] EXT4-fs (loop0): Test dummy encryption mode enabled [ 702.152920][T15681] EXT4-fs (loop3): Test dummy encryption mode enabled [ 702.159987][T15678] EXT4-fs (loop1): Test dummy encryption mode enabled [ 702.171436][T15681] EXT4-fs (loop3): inodes count not valid: 16253728 vs 32 [ 702.179697][T15685] EXT4-fs (loop0): bad geometry: block count 26688 exceeds size of device (64 blocks) [ 702.191096][T15665] loop4: detected capacity change from 512 to 0 [ 702.199709][T15678] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 702.212527][T15694] loop2: detected capacity change from 512 to 0 10:58:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48502, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 702.254776][T15665] EXT4-fs (loop4): Test dummy encryption mode enabled [ 702.261814][T15665] EXT4-fs (loop4): inodes count not valid: 234881056 vs 32 10:58:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000f4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 702.358129][T15694] EXT4-fs (loop2): Test dummy encryption mode enabled [ 702.387816][T15694] EXT4-fs (loop2): bad geometry: block count 100925504 exceeds size of device (64 blocks) 10:58:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000406c000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 702.402490][T15681] loop3: detected capacity change from 512 to 0 [ 702.437330][T15706] loop5: detected capacity change from 512 to 0 [ 702.445274][T15681] EXT4-fs (loop3): Test dummy encryption mode enabled [ 702.453971][T15681] EXT4-fs (loop3): inodes count not valid: 16253728 vs 32 [ 702.465094][T15712] loop1: detected capacity change from 578 to 0 [ 702.549931][T15720] loop0: detected capacity change from 512 to 0 [ 702.556962][T15712] EXT4-fs (loop1): Test dummy encryption mode enabled [ 702.557919][T15706] EXT4-fs (loop5): Test dummy encryption mode enabled [ 702.577414][T15717] loop4: detected capacity change from 512 to 0 10:58:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000703000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 702.590217][T15712] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 702.606231][T15706] EXT4-fs (loop5): inodes count not valid: 4194336 vs 32 [ 702.617544][T15720] EXT4-fs (loop0): Test dummy encryption mode enabled [ 702.632474][T15720] EXT4-fs (loop0): bad geometry: block count 27712 exceeds size of device (64 blocks) [ 702.636576][T15717] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200fff004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004074000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x47900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 702.673144][T15717] EXT4-fs (loop4): inodes count not valid: 251658272 vs 32 [ 702.818308][T15735] loop0: detected capacity change from 512 to 0 [ 702.844879][T15736] loop2: detected capacity change from 512 to 0 [ 702.858543][T15717] loop4: detected capacity change from 512 to 0 10:58:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x47900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 702.871836][T15717] EXT4-fs (loop4): Test dummy encryption mode enabled [ 702.903763][T15717] EXT4-fs (loop4): inodes count not valid: 251658272 vs 32 [ 702.918394][T15735] EXT4-fs (loop0): Test dummy encryption mode enabled [ 702.921850][T15706] loop5: detected capacity change from 512 to 0 [ 702.931783][T15735] EXT4-fs (loop0): bad geometry: block count 29760 exceeds size of device (64 blocks) [ 702.942186][T15736] EXT4-fs (loop2): Test dummy encryption mode enabled [ 702.956613][T15736] EXT4-fs (loop2): bad geometry: block count 117440576 exceeds size of device (64 blocks) [ 702.957445][T15749] loop3: detected capacity change from 512 to 0 [ 702.993807][T15706] EXT4-fs (loop5): Test dummy encryption mode enabled [ 703.036102][T15749] EXT4-fs (loop3): Test dummy encryption mode enabled [ 703.043203][T15749] EXT4-fs (loop3): inodes count not valid: 16715552 vs 32 [ 703.058490][T15706] EXT4-fs (loop5): inodes count not valid: 4194336 vs 32 10:58:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004104000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200141004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004079000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000903000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 703.086670][T15759] loop1: detected capacity change from 572 to 0 [ 703.097063][T15759] EXT4-fs (loop1): Test dummy encryption mode enabled [ 703.109130][T15759] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000005e00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x46800, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 703.472519][T15774] loop2: detected capacity change from 512 to 0 [ 703.490503][T15777] loop4: detected capacity change from 512 to 0 [ 703.499267][T15778] loop3: detected capacity change from 512 to 0 [ 703.512716][T15776] loop5: detected capacity change from 512 to 0 [ 703.521041][T15775] loop0: detected capacity change from 512 to 0 [ 703.540813][T15774] EXT4-fs (loop2): Test dummy encryption mode enabled [ 703.549921][T15777] EXT4-fs (loop4): Test dummy encryption mode enabled [ 703.561121][T15774] EXT4-fs (loop2): bad geometry: block count 150995008 exceeds size of device (64 blocks) 10:58:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200345004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 703.575414][T15785] loop1: detected capacity change from 564 to 0 [ 703.582505][T15776] EXT4-fs (loop5): Test dummy encryption mode enabled [ 703.589617][T15776] EXT4-fs (loop5): inodes count not valid: 4260128 vs 32 [ 703.597289][T15777] EXT4-fs (loop4): inodes count not valid: 268697632 vs 32 [ 703.615065][T15775] EXT4-fs (loop0): Test dummy encryption mode enabled 10:58:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020104000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 703.638959][T15778] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000a03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 703.681186][T15785] EXT4-fs (loop1): Test dummy encryption mode enabled [ 703.693987][T15775] EXT4-fs (loop0): bad geometry: block count 31040 exceeds size of device (64 blocks) [ 703.720537][T15778] EXT4-fs (loop3): bad geometry: block count 94 exceeds size of device (64 blocks) 10:58:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200048004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 703.722114][T15785] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40167, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 703.938250][T15804] loop5: detected capacity change from 512 to 0 [ 703.949678][T15799] loop4: detected capacity change from 512 to 0 10:58:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000407a000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 703.984460][T15778] loop3: detected capacity change from 512 to 0 [ 703.991596][T15804] EXT4-fs (loop5): Test dummy encryption mode enabled [ 704.009090][T15804] EXT4-fs (loop5): inodes count not valid: 4718624 vs 32 [ 704.045545][T15799] EXT4-fs (loop4): Test dummy encryption mode enabled [ 704.049774][T15778] EXT4-fs (loop3): Test dummy encryption mode enabled [ 704.061319][T15778] EXT4-fs (loop3): bad geometry: block count 94 exceeds size of device (64 blocks) [ 704.069070][T15799] EXT4-fs (loop4): inodes count not valid: 270532640 vs 32 [ 704.071659][T15818] loop2: detected capacity change from 512 to 0 [ 704.139812][T15818] EXT4-fs (loop2): Test dummy encryption mode enabled [ 704.150426][T15818] EXT4-fs (loop2): bad geometry: block count 167772224 exceeds size of device (64 blocks) 10:58:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006f00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20004c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 704.182598][T15825] loop0: detected capacity change from 512 to 0 [ 704.191405][T15824] loop1: detected capacity change from 512 to 0 [ 704.314175][T15825] EXT4-fs (loop0): Test dummy encryption mode enabled 10:58:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000b03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 704.371936][T15824] EXT4-fs (loop1): Test dummy encryption mode enabled 10:58:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000114000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 704.416910][T15825] EXT4-fs (loop0): bad geometry: block count 31296 exceeds size of device (64 blocks) [ 704.449039][T15842] loop5: detected capacity change from 512 to 0 [ 704.457319][T15824] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 704.486133][T15843] loop3: detected capacity change from 512 to 0 [ 704.546891][T15842] EXT4-fs (loop5): Test dummy encryption mode enabled [ 704.555521][T15842] EXT4-fs (loop5): inodes count not valid: 4980768 vs 32 [ 704.562765][T15847] loop4: detected capacity change from 512 to 0 [ 704.575229][T15841] loop2: detected capacity change from 512 to 0 10:58:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x45c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 704.613236][T15843] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20034d004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000407d000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 704.653763][T15843] EXT4-fs (loop3): bad geometry: block count 111 exceeds size of device (64 blocks) [ 704.683760][T15847] EXT4-fs (loop4): Test dummy encryption mode enabled [ 704.690867][T15847] EXT4-fs (loop4): inodes count not valid: 285212704 vs 32 [ 704.717896][T15841] EXT4-fs (loop2): Test dummy encryption mode enabled [ 704.724956][T15841] EXT4-fs (loop2): bad geometry: block count 184549440 exceeds size of device (64 blocks) [ 704.821107][T15860] loop1: detected capacity change from 558 to 0 [ 704.861927][T15843] loop3: detected capacity change from 512 to 0 [ 704.870869][T15847] loop4: detected capacity change from 512 to 0 [ 704.882106][T15864] loop0: detected capacity change from 512 to 0 [ 704.891262][T15860] EXT4-fs (loop1): Test dummy encryption mode enabled [ 704.896664][T15870] loop5: detected capacity change from 512 to 0 [ 704.925580][T15870] EXT4-fs (loop5): Test dummy encryption mode enabled [ 704.933175][T15864] EXT4-fs (loop0): Test dummy encryption mode enabled [ 704.940359][T15843] EXT4-fs (loop3): Test dummy encryption mode enabled [ 704.947770][T15847] EXT4-fs (loop4): Test dummy encryption mode enabled [ 704.986637][T15870] EXT4-fs (loop5): inodes count not valid: 5047072 vs 32 [ 705.000628][T15843] EXT4-fs (loop3): bad geometry: block count 111 exceeds size of device (64 blocks) [ 705.011955][T15864] EXT4-fs (loop0): bad geometry: block count 32064 exceeds size of device (64 blocks) [ 705.024685][T15847] EXT4-fs (loop4): inodes count not valid: 285212704 vs 32 [ 705.032627][T15860] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007f00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4011e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000c03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20005c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000124000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000407e000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000c000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 705.404531][T15901] loop3: detected capacity change from 512 to 0 [ 705.443935][T15896] loop0: detected capacity change from 512 to 0 [ 705.452630][T15899] loop5: detected capacity change from 512 to 0 [ 705.461454][T15900] loop4: detected capacity change from 512 to 0 [ 705.471673][T15901] EXT4-fs (loop3): Test dummy encryption mode enabled [ 705.471778][T15895] loop2: detected capacity change from 512 to 0 [ 705.488151][T15901] EXT4-fs (loop3): bad geometry: block count 192 exceeds size of device (64 blocks) [ 705.499539][T15896] EXT4-fs (loop0): Test dummy encryption mode enabled [ 705.507186][T15899] EXT4-fs (loop5): Test dummy encryption mode enabled [ 705.514223][T15900] EXT4-fs (loop4): Test dummy encryption mode enabled [ 705.521042][T15896] EXT4-fs (loop0): bad geometry: block count 32320 exceeds size of device (64 blocks) [ 705.530965][T15900] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 705.538455][T15899] EXT4-fs (loop5): inodes count not valid: 6029344 vs 32 [ 705.551116][T15898] loop1: detected capacity change from 512 to 0 [ 705.565492][T15895] EXT4-fs (loop2): Test dummy encryption mode enabled [ 705.575169][T15895] EXT4-fs (loop2): bad geometry: block count 201326656 exceeds size of device (64 blocks) 10:58:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000001f800000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 705.644294][T15901] loop3: detected capacity change from 512 to 0 [ 705.651597][T15898] EXT4-fs (loop1): Test dummy encryption mode enabled [ 705.669992][T15898] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20e40, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20025d004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004089000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 705.747113][T15900] loop4: detected capacity change from 512 to 0 [ 705.759401][T15900] EXT4-fs (loop4): Test dummy encryption mode enabled [ 705.778039][T15900] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:58:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000d03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 705.853475][T15932] loop0: detected capacity change from 512 to 0 10:58:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200001124000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 706.024340][T15932] EXT4-fs (loop0): Test dummy encryption mode enabled [ 706.031320][T15936] loop5: detected capacity change from 512 to 0 [ 706.063102][T15932] EXT4-fs (loop0): bad geometry: block count 35136 exceeds size of device (64 blocks) [ 706.072878][T15937] loop1: detected capacity change from 263 to 0 [ 706.083045][T15938] loop3: detected capacity change from 512 to 0 [ 706.103659][T15936] EXT4-fs (loop5): Test dummy encryption mode enabled [ 706.117009][T15936] EXT4-fs (loop5): inodes count not valid: 6095392 vs 32 10:58:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000401e010003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 706.144829][T15948] loop2: detected capacity change from 512 to 0 [ 706.151793][T15937] EXT4-fs (loop1): Test dummy encryption mode enabled [ 706.151987][T15938] EXT4-fs (loop3): Test dummy encryption mode enabled [ 706.166077][T15938] EXT4-fs (loop3): bad geometry: block count 248 exceeds size of device (64 blocks) [ 706.181683][T15937] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (32 blocks) [ 706.249097][T15948] EXT4-fs (loop2): Test dummy encryption mode enabled [ 706.256214][T15936] loop5: detected capacity change from 512 to 0 [ 706.262605][T15948] EXT4-fs (loop2): bad geometry: block count 218103872 exceeds size of device (64 blocks) [ 706.336594][T15959] loop4: detected capacity change from 512 to 0 [ 706.393919][T15938] loop3: detected capacity change from 512 to 0 [ 706.401210][T15936] EXT4-fs (loop5): Test dummy encryption mode enabled [ 706.425659][T15959] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4241b, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000e03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 706.441535][T15938] EXT4-fs (loop3): Test dummy encryption mode enabled [ 706.453964][T15959] EXT4-fs (loop4): inodes count not valid: 302055456 vs 32 [ 706.465792][T15936] EXT4-fs (loop5): inodes count not valid: 6095392 vs 32 [ 706.511378][T15938] EXT4-fs (loop3): bad geometry: block count 248 exceeds size of device (64 blocks) [ 706.521622][T15972] loop0: detected capacity change from 512 to 0 [ 706.533017][T15977] loop2: detected capacity change from 512 to 0 10:58:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200060004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 706.563018][T15978] loop1: detected capacity change from 530 to 0 [ 706.586698][T15977] EXT4-fs (loop2): Test dummy encryption mode enabled [ 706.593789][T15978] EXT4-fs (loop1): Test dummy encryption mode enabled [ 706.594050][T15972] EXT4-fs (loop0): Test dummy encryption mode enabled 10:58:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200003fff800000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200001154000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 706.622909][T15977] EXT4-fs (loop2): bad geometry: block count 234881088 exceeds size of device (64 blocks) [ 706.634834][T15972] EXT4-fs (loop0): bad geometry: block count 73280 exceeds size of device (64 blocks) [ 706.649282][T15978] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000f03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 706.833770][T15994] loop4: detected capacity change from 512 to 0 [ 706.841109][T15988] loop5: detected capacity change from 512 to 0 [ 706.852522][T15988] EXT4-fs (loop5): Test dummy encryption mode enabled [ 706.862421][T15997] loop3: detected capacity change from 512 to 0 [ 706.862487][T15988] EXT4-fs (loop5): inodes count not valid: 6291488 vs 32 10:58:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 706.985830][T15994] EXT4-fs (loop4): Test dummy encryption mode enabled [ 707.007275][T15997] EXT4-fs (loop3): Test dummy encryption mode enabled [ 707.018477][T15994] EXT4-fs (loop4): inodes count not valid: 352387104 vs 32 10:58:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004067010003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 707.032017][T15997] EXT4-fs (loop3): bad geometry: block count 248 exceeds size of device (64 blocks) [ 707.080291][T15988] loop5: detected capacity change from 512 to 0 [ 707.125869][T16011] loop2: detected capacity change from 512 to 0 [ 707.134029][T15988] EXT4-fs (loop5): Test dummy encryption mode enabled [ 707.158361][T15988] EXT4-fs (loop5): inodes count not valid: 6291488 vs 32 [ 707.166066][T16017] loop0: detected capacity change from 512 to 0 10:58:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200167004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 707.194375][T16011] EXT4-fs (loop2): Test dummy encryption mode enabled [ 707.207132][T16011] EXT4-fs (loop2): bad geometry: block count 251658304 exceeds size of device (64 blocks) [ 707.217184][T16023] loop1: detected capacity change from 528 to 0 [ 707.226489][T15994] loop4: detected capacity change from 512 to 0 [ 707.288517][T15997] loop3: detected capacity change from 512 to 0 10:58:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="207fffffff00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 707.346757][T15994] EXT4-fs (loop4): Test dummy encryption mode enabled [ 707.346798][T16023] EXT4-fs (loop1): Test dummy encryption mode enabled [ 707.360548][T15994] EXT4-fs (loop4): inodes count not valid: 352387104 vs 32 [ 707.369411][T16023] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 707.421907][T16017] EXT4-fs (loop0): Test dummy encryption mode enabled [ 707.458003][T16039] loop5: detected capacity change from 512 to 0 10:58:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000184000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000041003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 707.485941][T16039] EXT4-fs (loop5): Test dummy encryption mode enabled [ 707.492972][T16017] EXT4-fs (loop0): bad geometry: block count 91968 exceeds size of device (64 blocks) [ 707.509722][T16039] EXT4-fs (loop5): inodes count not valid: 6750496 vs 32 10:58:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000407a010003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 707.634572][T16048] loop1: detected capacity change from 527 to 0 [ 707.652551][T16048] EXT4-fs (loop1): Test dummy encryption mode enabled [ 707.678200][T16045] loop3: detected capacity change from 512 to 0 [ 707.688668][T16039] loop5: detected capacity change from 512 to 0 [ 707.712234][T16048] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 707.724777][T16060] loop2: detected capacity change from 512 to 0 [ 707.775339][T16039] EXT4-fs (loop5): Test dummy encryption mode enabled [ 707.782320][T16052] loop4: detected capacity change from 512 to 0 [ 707.783190][T16039] EXT4-fs (loop5): inodes count not valid: 6750496 vs 32 10:58:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41b27, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 707.818004][T16045] EXT4-fs (loop3): Test dummy encryption mode enabled [ 707.825708][T16060] EXT4-fs (loop2): Test dummy encryption mode enabled [ 707.845744][T16066] loop0: detected capacity change from 512 to 0 [ 707.848675][T16045] EXT4-fs (loop3): bad geometry: block count 255 exceeds size of device (64 blocks) [ 707.863403][T16052] EXT4-fs (loop4): Test dummy encryption mode enabled [ 707.875130][T16060] EXT4-fs (loop2): bad geometry: block count 268697664 exceeds size of device (64 blocks) [ 707.885379][T16066] EXT4-fs (loop0): Test dummy encryption mode enabled [ 707.907371][T16052] EXT4-fs (loop4): inodes count not valid: 402653216 vs 32 [ 707.934875][T16066] EXT4-fs (loop0): bad geometry: block count 96832 exceeds size of device (64 blocks) 10:58:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200068004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000408e010003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 708.104273][T16076] loop1: detected capacity change from 525 to 0 10:58:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000201003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 708.155713][T16045] loop3: detected capacity change from 512 to 0 [ 708.235269][T16076] EXT4-fs (loop1): Test dummy encryption mode enabled [ 708.242296][T16085] loop0: detected capacity change from 512 to 0 [ 708.262108][T16045] EXT4-fs (loop3): Test dummy encryption mode enabled [ 708.271468][T16084] loop5: detected capacity change from 512 to 0 10:58:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000241b4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 708.272199][T16045] EXT4-fs (loop3): bad geometry: block count 255 exceeds size of device (64 blocks) [ 708.287894][T16076] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 708.290707][T16085] EXT4-fs (loop0): Test dummy encryption mode enabled [ 708.315299][T16085] EXT4-fs (loop0): bad geometry: block count 101952 exceeds size of device (64 blocks) 10:58:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200002004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 708.354769][T16084] EXT4-fs (loop5): Test dummy encryption mode enabled [ 708.372649][T16084] EXT4-fs (loop5): inodes count not valid: 6815776 vs 32 10:58:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 708.409355][T16099] loop2: detected capacity change from 512 to 0 [ 708.443008][T16102] loop4: detected capacity change from 512 to 0 10:58:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040f8010003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 708.461065][T16099] EXT4-fs (loop2): Test dummy encryption mode enabled [ 708.469210][T16099] EXT4-fs (loop2): bad geometry: block count 270532672 exceeds size of device (64 blocks) 10:58:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000001103000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 708.545708][T16102] EXT4-fs (loop4): Test dummy encryption mode enabled [ 708.553173][T16102] EXT4-fs (loop4): inodes count not valid: 455344160 vs 32 [ 708.560893][T16109] loop3: detected capacity change from 512 to 0 10:58:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20006c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 708.681500][T16119] loop1: detected capacity change from 264192 to 0 [ 708.682299][T16109] EXT4-fs (loop3): Test dummy encryption mode enabled [ 708.690419][T16120] loop0: detected capacity change from 512 to 0 [ 708.701373][T16109] EXT4-fs (loop3): inodes count not valid: 131104 vs 32 [ 708.761675][T16120] EXT4-fs (loop0): Test dummy encryption mode enabled [ 708.769418][T16119] EXT4-fs (loop1): Test dummy encryption mode enabled [ 708.777041][T16102] loop4: detected capacity change from 512 to 0 [ 708.777158][T16120] EXT4-fs (loop0): bad geometry: block count 129088 exceeds size of device (64 blocks) [ 708.805629][T16129] loop2: detected capacity change from 512 to 0 [ 708.812740][T16119] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 708.855311][T16102] EXT4-fs (loop4): Test dummy encryption mode enabled [ 708.862329][T16129] EXT4-fs (loop2): Test dummy encryption mode enabled [ 708.883475][T16102] EXT4-fs (loop4): inodes count not valid: 455344160 vs 32 [ 708.891073][T16129] EXT4-fs (loop2): bad geometry: block count 285212736 exceeds size of device (64 blocks) 10:58:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200003004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 708.916736][T16138] loop5: detected capacity change from 512 to 0 [ 708.948784][T16138] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000271b4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41200, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004004020003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 708.980868][T16138] EXT4-fs (loop5): inodes count not valid: 7077920 vs 32 10:58:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000001203000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 709.204818][T16150] loop3: detected capacity change from 512 to 0 [ 709.213518][T16151] loop0: detected capacity change from 512 to 0 [ 709.221417][T16155] loop1: detected capacity change from 521 to 0 [ 709.233191][T16148] loop4: detected capacity change from 512 to 0 [ 709.265226][T16138] loop5: detected capacity change from 512 to 0 [ 709.272709][T16155] EXT4-fs (loop1): Test dummy encryption mode enabled [ 709.287856][T16150] EXT4-fs (loop3): Test dummy encryption mode enabled [ 709.295046][T16151] EXT4-fs (loop0): Test dummy encryption mode enabled [ 709.306369][T16148] EXT4-fs (loop4): Test dummy encryption mode enabled [ 709.316897][T16167] loop2: detected capacity change from 512 to 0 [ 709.317631][T16150] EXT4-fs (loop3): inodes count not valid: 196640 vs 32 [ 709.330428][T16151] EXT4-fs (loop0): bad geometry: block count 132160 exceeds size of device (64 blocks) [ 709.341639][T16148] EXT4-fs (loop4): inodes count not valid: 455540768 vs 32 [ 709.355018][T16155] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001f4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 709.394135][T16138] EXT4-fs (loop5): Test dummy encryption mode enabled [ 709.410628][T16167] EXT4-fs (loop2): Test dummy encryption mode enabled 10:58:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004011020003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 709.439887][T16138] EXT4-fs (loop5): inodes count not valid: 7077920 vs 32 [ 709.466593][T16167] EXT4-fs (loop2): bad geometry: block count 301989952 exceeds size of device (64 blocks) 10:58:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200074004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 709.498901][T16177] loop4: detected capacity change from 512 to 0 10:58:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 709.624095][T16177] EXT4-fs (loop4): Test dummy encryption mode enabled [ 709.631163][T16177] EXT4-fs (loop4): inodes count not valid: 520093728 vs 32 10:58:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000204000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 709.732901][T16183] loop3: detected capacity change from 512 to 0 [ 709.762448][T16183] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000001803000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20007a004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 709.782996][T16183] EXT4-fs (loop3): inodes count not valid: 262176 vs 32 [ 709.808561][T16191] loop0: detected capacity change from 512 to 0 [ 709.893646][T16200] loop1: detected capacity change from 519 to 0 [ 709.893919][T16191] EXT4-fs (loop0): Test dummy encryption mode enabled [ 709.914099][T16203] loop4: detected capacity change from 512 to 0 [ 709.914105][T16191] EXT4-fs (loop0): bad geometry: block count 135488 exceeds size of device (64 blocks) [ 709.932450][T16206] loop2: detected capacity change from 512 to 0 [ 709.947780][T16200] EXT4-fs (loop1): Test dummy encryption mode enabled [ 709.955347][T16203] EXT4-fs (loop4): Test dummy encryption mode enabled [ 709.962168][T16183] loop3: detected capacity change from 512 to 0 [ 709.976222][T16203] EXT4-fs (loop4): inodes count not valid: 536870944 vs 32 [ 709.985280][T16183] EXT4-fs (loop3): Test dummy encryption mode enabled [ 710.005058][T16200] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 710.020691][T16183] EXT4-fs (loop3): inodes count not valid: 262176 vs 32 [ 710.031004][T16206] EXT4-fs (loop2): Test dummy encryption mode enabled [ 710.047856][T16206] EXT4-fs (loop2): bad geometry: block count 402653248 exceeds size of device (64 blocks) 10:58:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001f4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 710.093907][T16218] loop5: detected capacity change from 512 to 0 10:58:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200005004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040e0020003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 710.267146][T16203] loop4: detected capacity change from 512 to 0 [ 710.280584][T16218] EXT4-fs (loop5): Test dummy encryption mode enabled [ 710.305143][T16218] EXT4-fs (loop5): inodes count not valid: 7995424 vs 32 10:58:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200010204000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000001903000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 710.484221][T16236] loop0: detected capacity change from 512 to 0 [ 710.499290][T16235] loop3: detected capacity change from 512 to 0 [ 710.509040][T16234] loop1: detected capacity change from 512 to 0 [ 710.524712][T16234] EXT4-fs (loop1): Test dummy encryption mode enabled [ 710.531709][T16234] EXT4-fs (loop1): inodes count not valid: 520093728 vs 32 [ 710.551911][T16235] EXT4-fs (loop3): Test dummy encryption mode enabled [ 710.559519][T16236] EXT4-fs (loop0): Test dummy encryption mode enabled [ 710.570319][T16218] loop5: detected capacity change from 512 to 0 [ 710.581601][T16236] EXT4-fs (loop0): bad geometry: block count 188480 exceeds size of device (64 blocks) [ 710.590593][T16235] EXT4-fs (loop3): inodes count not valid: 327712 vs 32 [ 710.591371][T16245] loop2: detected capacity change from 512 to 0 [ 710.613639][T16218] EXT4-fs (loop5): Test dummy encryption mode enabled [ 710.622213][T16218] EXT4-fs (loop5): inodes count not valid: 7995424 vs 32 10:58:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000030003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 710.685643][T16245] EXT4-fs (loop2): Test dummy encryption mode enabled [ 710.692814][T16245] EXT4-fs (loop2): bad geometry: block count 419430464 exceeds size of device (64 blocks) 10:58:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40b00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 710.745476][T16257] loop4: detected capacity change from 512 to 0 10:58:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200089004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000002003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 710.840102][T16235] loop3: detected capacity change from 512 to 0 [ 710.861183][T16257] EXT4-fs (loop4): Test dummy encryption mode enabled [ 710.882315][T16257] EXT4-fs (loop4): inodes count not valid: 537919520 vs 32 [ 710.896653][T16235] EXT4-fs (loop3): Test dummy encryption mode enabled [ 710.915457][T16235] EXT4-fs (loop3): inodes count not valid: 327712 vs 32 [ 710.993809][T16266] loop0: detected capacity change from 512 to 0 [ 711.000718][T16270] loop1: detected capacity change from 517 to 0 10:58:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200006004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 711.096111][T16271] loop5: detected capacity change from 512 to 0 [ 711.109912][T16270] EXT4-fs (loop1): Test dummy encryption mode enabled [ 711.117548][T16280] loop2: detected capacity change from 512 to 0 [ 711.133377][T16271] EXT4-fs (loop5): Test dummy encryption mode enabled [ 711.140458][T16271] EXT4-fs (loop5): inodes count not valid: 8978464 vs 32 [ 711.145111][T16270] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 711.214106][T16266] EXT4-fs (loop0): Test dummy encryption mode enabled [ 711.214260][T16280] EXT4-fs (loop2): Test dummy encryption mode enabled [ 711.229994][T16257] loop4: detected capacity change from 512 to 0 [ 711.244464][T16266] EXT4-fs (loop0): bad geometry: block count 196672 exceeds size of device (64 blocks) 10:58:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 711.258966][T16280] EXT4-fs (loop2): bad geometry: block count 536870976 exceeds size of device (64 blocks) 10:58:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000214000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 711.353677][T16293] loop3: detected capacity change from 512 to 0 [ 711.453607][T16271] loop5: detected capacity change from 512 to 0 10:58:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200007004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 711.493851][T16293] EXT4-fs (loop3): Test dummy encryption mode enabled [ 711.500871][T16293] EXT4-fs (loop3): inodes count not valid: 393248 vs 32 [ 711.551970][T16271] EXT4-fs (loop5): Test dummy encryption mode enabled [ 711.574749][T16271] EXT4-fs (loop5): inodes count not valid: 8978464 vs 32 [ 711.587278][T16309] loop1: detected capacity change from 516 to 0 10:58:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000401f030003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20029d004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 711.602551][T16311] loop4: detected capacity change from 512 to 0 [ 711.616173][T16309] EXT4-fs (loop1): Test dummy encryption mode enabled 10:58:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000102003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 711.653942][T16309] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 711.725064][T16311] EXT4-fs (loop4): Test dummy encryption mode enabled [ 711.739646][T16311] EXT4-fs (loop4): inodes count not valid: 553648160 vs 32 [ 711.751742][T16319] loop5: detected capacity change from 512 to 0 10:58:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200008004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 711.873513][T16324] loop0: detected capacity change from 512 to 0 [ 711.901470][T16319] EXT4-fs (loop5): Test dummy encryption mode enabled [ 711.908416][T16328] loop2: detected capacity change from 512 to 0 [ 711.951663][T16319] EXT4-fs (loop5): inodes count not valid: 10289696 vs 32 [ 711.960094][T16311] loop4: detected capacity change from 512 to 0 [ 711.978259][T16324] EXT4-fs (loop0): Test dummy encryption mode enabled [ 711.984967][T16328] EXT4-fs (loop2): Test dummy encryption mode enabled [ 712.000259][T16339] loop1: detected capacity change from 515 to 0 [ 712.002908][T16324] EXT4-fs (loop0): bad geometry: block count 204608 exceeds size of device (64 blocks) [ 712.016686][T16337] loop3: detected capacity change from 512 to 0 [ 712.024198][T16311] EXT4-fs (loop4): Test dummy encryption mode enabled [ 712.029462][T16337] EXT4-fs (loop3): Test dummy encryption mode enabled [ 712.042128][T16328] EXT4-fs (loop2): bad geometry: block count 537919552 exceeds size of device (64 blocks) [ 712.053062][T16337] EXT4-fs (loop3): inodes count not valid: 524320 vs 32 [ 712.061069][T16311] EXT4-fs (loop4): inodes count not valid: 553648160 vs 32 [ 712.070417][T16339] EXT4-fs (loop1): Test dummy encryption mode enabled [ 712.086790][T16339] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20001b244000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000002103000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2002a1004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 712.228611][T16337] loop3: detected capacity change from 512 to 0 10:58:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040f0030003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 712.354033][T16337] EXT4-fs (loop3): Test dummy encryption mode enabled [ 712.361061][T16337] EXT4-fs (loop3): inodes count not valid: 524320 vs 32 [ 712.387180][T16362] loop1: detected capacity change from 512 to 0 [ 712.395599][T16361] loop5: detected capacity change from 512 to 0 [ 712.410442][T16357] loop2: detected capacity change from 512 to 0 [ 712.419999][T16362] EXT4-fs (loop1): Test dummy encryption mode enabled [ 712.445240][T16369] loop0: detected capacity change from 512 to 0 10:58:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200009004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 712.446462][T16362] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 712.462102][T16369] EXT4-fs (loop0): Test dummy encryption mode enabled [ 712.472049][T16376] loop4: detected capacity change from 512 to 0 [ 712.472116][T16369] EXT4-fs (loop0): bad geometry: block count 258112 exceeds size of device (64 blocks) [ 712.480544][T16357] EXT4-fs (loop2): Test dummy encryption mode enabled [ 712.502248][T16361] EXT4-fs (loop5): Test dummy encryption mode enabled [ 712.515180][T16361] EXT4-fs (loop5): inodes count not valid: 10551840 vs 32 [ 712.522773][T16357] EXT4-fs (loop2): bad geometry: block count 553648192 exceeds size of device (64 blocks) [ 712.575078][T16376] EXT4-fs (loop4): Test dummy encryption mode enabled [ 712.582114][T16376] EXT4-fs (loop4): inodes count not valid: 605749280 vs 32 10:58:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000002503000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4a000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 712.644456][T16361] loop5: detected capacity change from 512 to 0 [ 712.652047][T11912] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 10:58:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004002040003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 712.764215][T16361] EXT4-fs (loop5): Test dummy encryption mode enabled [ 712.771312][T16361] EXT4-fs (loop5): inodes count not valid: 10551840 vs 32 [ 712.843345][T16392] loop0: detected capacity change from 512 to 0 [ 712.857946][T16388] loop3: detected capacity change from 512 to 0 [ 712.877351][T16396] loop2: detected capacity change from 512 to 0 10:58:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2001a2004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 712.931024][T16404] loop1: detected capacity change from 264192 to 0 [ 712.940432][T16388] EXT4-fs (loop3): Test dummy encryption mode enabled [ 712.963804][T16388] EXT4-fs (loop3): inodes count not valid: 589856 vs 32 10:58:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000254000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 712.988318][T16392] EXT4-fs (loop0): Test dummy encryption mode enabled [ 713.003161][T16396] EXT4-fs (loop2): Test dummy encryption mode enabled [ 713.018624][T16396] EXT4-fs (loop2): bad geometry: block count 620757056 exceeds size of device (64 blocks) [ 713.020697][T16404] EXT4-fs (loop1): Test dummy encryption mode enabled 10:58:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000a004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 713.056359][T16392] EXT4-fs (loop0): bad geometry: block count 262720 exceeds size of device (64 blocks) [ 713.083145][T16404] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40410, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 713.144524][T16410] loop4: detected capacity change from 512 to 0 10:58:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004006040003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 713.302360][T16416] loop3: detected capacity change from 512 to 0 [ 713.312487][T16410] EXT4-fs (loop4): Test dummy encryption mode enabled [ 713.330201][T16410] EXT4-fs (loop4): inodes count not valid: 620757024 vs 32 [ 713.341556][T16418] loop5: detected capacity change from 512 to 0 10:58:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000002e03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 713.368198][T16416] EXT4-fs (loop3): Test dummy encryption mode enabled [ 713.381493][T16416] EXT4-fs (loop3): inodes count not valid: 655392 vs 32 [ 713.402949][T16430] loop1: detected capacity change from 514 to 0 [ 713.410941][T16418] EXT4-fs (loop5): Test dummy encryption mode enabled [ 713.420446][T16418] EXT4-fs (loop5): inodes count not valid: 10617120 vs 32 [ 713.435539][T16410] loop4: detected capacity change from 512 to 0 [ 713.474897][T16437] loop0: detected capacity change from 512 to 0 [ 713.486278][T16410] EXT4-fs (loop4): Test dummy encryption mode enabled [ 713.486317][T16430] EXT4-fs (loop1): Test dummy encryption mode enabled [ 713.504597][T16416] loop3: detected capacity change from 512 to 0 [ 713.515304][T16437] EXT4-fs (loop0): Test dummy encryption mode enabled [ 713.515485][T16430] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 713.536784][T16418] loop5: detected capacity change from 512 to 0 [ 713.545941][T16416] EXT4-fs (loop3): Test dummy encryption mode enabled [ 713.567290][T16418] EXT4-fs (loop5): Test dummy encryption mode enabled [ 713.574767][T16437] EXT4-fs (loop0): bad geometry: block count 263744 exceeds size of device (64 blocks) [ 713.595160][T16451] loop2: detected capacity change from 512 to 0 [ 713.610582][T16416] EXT4-fs (loop3): inodes count not valid: 655392 vs 32 10:58:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40406, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 713.636434][T16451] EXT4-fs (loop2): Test dummy encryption mode enabled [ 713.645177][T16418] EXT4-fs (loop5): inodes count not valid: 10617120 vs 32 [ 713.666444][T16410] EXT4-fs (loop4): inodes count not valid: 620757024 vs 32 [ 713.709689][T16451] EXT4-fs (loop2): bad geometry: block count 771752000 exceeds size of device (64 blocks) 10:58:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000b004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20001b274000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2003a5004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004010040003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000003f03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 714.017057][T16464] loop3: detected capacity change from 512 to 0 [ 714.025872][T16466] loop1: detected capacity change from 514 to 0 [ 714.075881][T16467] loop4: detected capacity change from 512 to 0 [ 714.086049][T16474] loop0: detected capacity change from 512 to 0 [ 714.098843][T16464] EXT4-fs (loop3): Test dummy encryption mode enabled [ 714.103356][T16466] EXT4-fs (loop1): Test dummy encryption mode enabled [ 714.116280][T16479] loop2: detected capacity change from 512 to 0 [ 714.124796][T16464] EXT4-fs (loop3): inodes count not valid: 720928 vs 32 [ 714.125273][T16466] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 714.132629][T16474] EXT4-fs (loop0): Test dummy encryption mode enabled [ 714.153636][T16474] EXT4-fs (loop0): bad geometry: block count 266304 exceeds size of device (64 blocks) [ 714.159918][T16485] loop5: detected capacity change from 512 to 0 [ 714.170745][T16467] EXT4-fs (loop4): Test dummy encryption mode enabled [ 714.179268][T16467] EXT4-fs (loop4): inodes count not valid: 656080928 vs 32 [ 714.215386][T16479] EXT4-fs (loop2): Test dummy encryption mode enabled [ 714.224562][T16479] EXT4-fs (loop2): bad geometry: block count 1056964672 exceeds size of device (64 blocks) [ 714.266061][T16485] EXT4-fs (loop5): Test dummy encryption mode enabled [ 714.273338][T16485] EXT4-fs (loop5): inodes count not valid: 10814240 vs 32 10:58:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403f8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000004003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 714.341347][T16464] loop3: detected capacity change from 512 to 0 10:58:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2015a5004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000050003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 714.401961][T16467] loop4: detected capacity change from 512 to 0 [ 714.433090][T16467] EXT4-fs (loop4): Test dummy encryption mode enabled [ 714.433124][T16464] EXT4-fs (loop3): Test dummy encryption mode enabled [ 714.475163][T16464] EXT4-fs (loop3): inodes count not valid: 720928 vs 32 [ 714.482503][T16467] EXT4-fs (loop4): inodes count not valid: 656080928 vs 32 [ 714.562834][T16506] loop1: detected capacity change from 513 to 0 [ 714.569611][T16504] loop2: detected capacity change from 512 to 0 10:58:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 714.618373][T16505] loop5: detected capacity change from 512 to 0 [ 714.629694][T16507] loop0: detected capacity change from 512 to 0 10:58:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200001294000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 714.681955][T16504] EXT4-fs (loop2): Test dummy encryption mode enabled [ 714.689173][T16506] EXT4-fs (loop1): Test dummy encryption mode enabled [ 714.714715][T16504] EXT4-fs (loop2): bad geometry: block count 1073741888 exceeds size of device (64 blocks) [ 714.732773][T16505] EXT4-fs (loop5): Test dummy encryption mode enabled [ 714.739876][T16507] EXT4-fs (loop0): Test dummy encryption mode enabled [ 714.763082][T16506] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 714.777396][T16505] EXT4-fs (loop5): inodes count not valid: 10818848 vs 32 [ 714.786402][T16521] loop3: detected capacity change from 512 to 0 [ 714.786436][T16507] EXT4-fs (loop0): bad geometry: block count 327744 exceeds size of device (64 blocks) 10:58:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4033a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 714.934210][T16521] EXT4-fs (loop3): Test dummy encryption mode enabled [ 714.941159][T16525] loop4: detected capacity change from 512 to 0 [ 714.957371][T16521] EXT4-fs (loop3): inodes count not valid: 786464 vs 32 [ 715.012136][T16505] loop5: detected capacity change from 512 to 0 [ 715.012621][T16525] EXT4-fs (loop4): Test dummy encryption mode enabled [ 715.039619][T16525] EXT4-fs (loop4): inodes count not valid: 687931424 vs 32 10:58:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000004803000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000060003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 715.077281][T16505] EXT4-fs (loop5): Test dummy encryption mode enabled [ 715.092923][T16505] EXT4-fs (loop5): inodes count not valid: 10818848 vs 32 10:58:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2015a6004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 715.190479][T16541] loop1: detected capacity change from 513 to 0 [ 715.200390][T16521] loop3: detected capacity change from 512 to 0 [ 715.212815][T16525] loop4: detected capacity change from 512 to 0 10:58:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2001b3004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 715.235118][T16521] EXT4-fs (loop3): Test dummy encryption mode enabled [ 715.246026][T16554] loop2: detected capacity change from 512 to 0 [ 715.253932][T16541] EXT4-fs (loop1): Test dummy encryption mode enabled [ 715.254573][T16554] EXT4-fs (loop2): Test dummy encryption mode enabled [ 715.268350][T16554] EXT4-fs (loop2): bad geometry: block count 1207959616 exceeds size of device (64 blocks) [ 715.273868][T16525] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000004c03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 715.285473][T16521] EXT4-fs (loop3): inodes count not valid: 786464 vs 32 [ 715.301948][T16525] EXT4-fs (loop4): inodes count not valid: 687931424 vs 32 [ 715.312307][T16541] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000d004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000002e4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 715.373354][T16559] loop0: detected capacity change from 512 to 0 10:58:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402a1, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 715.453482][T16559] EXT4-fs (loop0): Test dummy encryption mode enabled [ 715.460594][T16567] loop2: detected capacity change from 512 to 0 [ 715.477202][T16559] EXT4-fs (loop0): bad geometry: block count 393280 exceeds size of device (64 blocks) [ 715.613656][T16563] loop5: detected capacity change from 512 to 0 [ 715.629678][T16567] EXT4-fs (loop2): Test dummy encryption mode enabled [ 715.640481][T16579] loop1: detected capacity change from 513 to 0 10:58:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004004060003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 715.663734][T16579] EXT4-fs (loop1): Test dummy encryption mode enabled [ 715.676345][T16563] EXT4-fs (loop5): Test dummy encryption mode enabled [ 715.688840][T16567] EXT4-fs (loop2): bad geometry: block count 1275068480 exceeds size of device (64 blocks) [ 715.717233][T16579] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 715.733894][T16563] EXT4-fs (loop5): inodes count not valid: 11731232 vs 32 [ 715.834641][T16586] loop3: detected capacity change from 512 to 0 [ 715.841406][T16589] loop4: detected capacity change from 512 to 0 [ 715.869289][T16591] loop0: detected capacity change from 512 to 0 [ 715.895762][T16586] EXT4-fs (loop3): Test dummy encryption mode enabled [ 715.906555][T16563] loop5: detected capacity change from 512 to 0 [ 715.921886][T16589] EXT4-fs (loop4): Test dummy encryption mode enabled [ 715.922168][T16591] EXT4-fs (loop0): Test dummy encryption mode enabled [ 715.937082][T16563] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4029d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000005c03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2002c3004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 715.948311][T16589] EXT4-fs (loop4): inodes count not valid: 771751968 vs 32 [ 715.959344][T16563] EXT4-fs (loop5): inodes count not valid: 11731232 vs 32 [ 715.972789][T16591] EXT4-fs (loop0): bad geometry: block count 394304 exceeds size of device (64 blocks) [ 715.984992][T16586] EXT4-fs (loop3): inodes count not valid: 852000 vs 32 10:58:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000070003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 716.208215][T16589] loop4: detected capacity change from 512 to 0 [ 716.215336][T16606] loop2: detected capacity change from 512 to 0 [ 716.244458][T16612] loop1: detected capacity change from 513 to 0 [ 716.251604][T16606] EXT4-fs (loop2): Test dummy encryption mode enabled [ 716.262192][T16589] EXT4-fs (loop4): Test dummy encryption mode enabled [ 716.271984][T16606] EXT4-fs (loop2): bad geometry: block count 1543503936 exceeds size of device (64 blocks) [ 716.272001][T16586] loop3: detected capacity change from 512 to 0 [ 716.294532][T16589] EXT4-fs (loop4): inodes count not valid: 771751968 vs 32 [ 716.307205][T16612] EXT4-fs (loop1): Test dummy encryption mode enabled [ 716.329893][T16623] loop0: detected capacity change from 512 to 0 10:58:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000324000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 716.360751][T16612] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 716.410992][T16586] EXT4-fs (loop3): Test dummy encryption mode enabled [ 716.417500][T16623] EXT4-fs (loop0): Test dummy encryption mode enabled [ 716.418052][T16586] EXT4-fs (loop3): inodes count not valid: 852000 vs 32 [ 716.444061][T16630] loop5: detected capacity change from 512 to 0 10:58:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4025f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000025f03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 716.463580][T16623] EXT4-fs (loop0): bad geometry: block count 458816 exceeds size of device (64 blocks) 10:58:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000e004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 716.519045][T16630] EXT4-fs (loop5): Test dummy encryption mode enabled [ 716.527692][T16630] EXT4-fs (loop5): inodes count not valid: 12780064 vs 32 10:58:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c6004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000090003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 716.703589][T16636] loop4: detected capacity change from 512 to 0 [ 716.711738][T16636] EXT4-fs (loop4): Test dummy encryption mode enabled [ 716.728241][T16640] loop2: detected capacity change from 512 to 0 [ 716.734214][T16636] EXT4-fs (loop4): inodes count not valid: 838860832 vs 32 [ 716.784216][T16640] EXT4-fs (loop2): Test dummy encryption mode enabled [ 716.800965][T16650] loop3: detected capacity change from 512 to 0 [ 716.807368][T16640] EXT4-fs (loop2): bad geometry: block count 1593966656 exceeds size of device (64 blocks) [ 716.843711][T16655] loop1: detected capacity change from 513 to 0 [ 716.853200][T16650] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000f004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 716.885156][T16650] EXT4-fs (loop3): inodes count not valid: 917536 vs 32 [ 716.898918][T16636] loop4: detected capacity change from 512 to 0 [ 716.913132][T16655] EXT4-fs (loop1): Test dummy encryption mode enabled [ 716.926452][T16636] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000006003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 716.965077][T16636] EXT4-fs (loop4): inodes count not valid: 838860832 vs 32 [ 716.976000][T16663] loop0: detected capacity change from 512 to 0 [ 716.988310][T16655] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 717.114784][T16666] loop5: detected capacity change from 512 to 0 [ 717.128038][T16663] EXT4-fs (loop0): Test dummy encryption mode enabled [ 717.142608][T16663] EXT4-fs (loop0): bad geometry: block count 589888 exceeds size of device (64 blocks) 10:58:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000033a4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401a0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 717.166777][T16666] EXT4-fs (loop5): Test dummy encryption mode enabled [ 717.196874][T16666] EXT4-fs (loop5): inodes count not valid: 12976160 vs 32 [ 717.253328][T16677] loop2: detected capacity change from 512 to 0 [ 717.303313][T16678] loop3: detected capacity change from 512 to 0 [ 717.353323][T16678] EXT4-fs (loop3): Test dummy encryption mode enabled [ 717.363825][T16677] EXT4-fs (loop2): Test dummy encryption mode enabled [ 717.371669][T16678] EXT4-fs (loop3): inodes count not valid: 983072 vs 32 [ 717.381255][T16666] loop5: detected capacity change from 512 to 0 [ 717.389318][T16666] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000a0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c7004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 717.405744][T16666] EXT4-fs (loop5): inodes count not valid: 12976160 vs 32 [ 717.422860][T16677] EXT4-fs (loop2): bad geometry: block count 1610612800 exceeds size of device (64 blocks) [ 717.524350][T16694] loop1: detected capacity change from 512 to 0 [ 717.573198][T16693] loop4: detected capacity change from 512 to 0 [ 717.618104][T16694] EXT4-fs (loop1): Test dummy encryption mode enabled [ 717.627891][T16693] EXT4-fs (loop4): Test dummy encryption mode enabled [ 717.631856][T16678] loop3: detected capacity change from 512 to 0 [ 717.654815][T16693] EXT4-fs (loop4): inodes count not valid: 973275168 vs 32 10:58:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000006803000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 717.678529][T16701] loop0: detected capacity change from 512 to 0 [ 717.684636][T16694] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 717.699743][T16678] EXT4-fs (loop3): Test dummy encryption mode enabled [ 717.722628][T16678] EXT4-fs (loop3): inodes count not valid: 983072 vs 32 [ 717.737206][T16712] loop5: detected capacity change from 512 to 0 10:58:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200010004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400e8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 717.800210][T16701] EXT4-fs (loop0): Test dummy encryption mode enabled [ 717.807413][T16712] EXT4-fs (loop5): Test dummy encryption mode enabled [ 717.823001][T16712] EXT4-fs (loop5): inodes count not valid: 13041696 vs 32 [ 717.826087][T16701] EXT4-fs (loop0): bad geometry: block count 655424 exceeds size of device (64 blocks) [ 717.830290][T16693] loop4: detected capacity change from 512 to 0 [ 717.890926][T16719] loop2: detected capacity change from 512 to 0 [ 717.973439][T16693] EXT4-fs (loop4): Test dummy encryption mode enabled [ 717.980490][T16693] EXT4-fs (loop4): inodes count not valid: 973275168 vs 32 [ 718.069735][T16719] EXT4-fs (loop2): Test dummy encryption mode enabled [ 718.076930][T16719] EXT4-fs (loop2): bad geometry: block count 1744830528 exceeds size of device (64 blocks) 10:58:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000b0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 718.122418][T16712] loop5: detected capacity change from 512 to 0 [ 718.129807][T16712] EXT4-fs (loop5): Test dummy encryption mode enabled [ 718.140244][T16712] EXT4-fs (loop5): inodes count not valid: 13041696 vs 32 [ 718.147695][T16730] loop1: detected capacity change from 512 to 0 10:58:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000003f4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000006c03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 718.196276][T16737] loop3: detected capacity change from 512 to 0 10:58:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c8004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 718.313543][T16730] EXT4-fs (loop1): Test dummy encryption mode enabled [ 718.321645][T16730] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 718.353338][T16737] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400e5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 718.438719][T16737] EXT4-fs (loop3): inodes count not valid: 1048608 vs 32 [ 718.473412][T16749] loop0: detected capacity change from 512 to 0 [ 718.481110][T16750] loop4: detected capacity change from 512 to 0 [ 718.498623][T16754] loop5: detected capacity change from 512 to 0 [ 718.511500][T16753] loop2: detected capacity change from 512 to 0 [ 718.523446][T16754] EXT4-fs (loop5): Test dummy encryption mode enabled [ 718.525921][T16750] EXT4-fs (loop4): Test dummy encryption mode enabled [ 718.530691][T16749] EXT4-fs (loop0): Test dummy encryption mode enabled [ 718.544253][T16750] EXT4-fs (loop4): inodes count not valid: 1056964640 vs 32 [ 718.558344][T16754] EXT4-fs (loop5): inodes count not valid: 13107232 vs 32 [ 718.567426][T16749] EXT4-fs (loop0): bad geometry: block count 720960 exceeds size of device (64 blocks) 10:58:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000c0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 718.673614][T16753] EXT4-fs (loop2): Test dummy encryption mode enabled [ 718.680753][T16753] EXT4-fs (loop2): bad geometry: block count 1811939392 exceeds size of device (64 blocks) [ 718.690907][T16765] loop1: detected capacity change from 512 to 0 [ 718.758305][T16737] loop3: detected capacity change from 512 to 0 [ 718.771752][T16750] loop4: detected capacity change from 512 to 0 [ 718.786801][T16754] loop5: detected capacity change from 512 to 0 [ 718.793367][T16765] EXT4-fs (loop1): Test dummy encryption mode enabled [ 718.803237][T16754] EXT4-fs (loop5): Test dummy encryption mode enabled [ 718.808895][T16737] EXT4-fs (loop3): Test dummy encryption mode enabled [ 718.817390][T16750] EXT4-fs (loop4): Test dummy encryption mode enabled [ 718.837497][T16754] EXT4-fs (loop5): inodes count not valid: 13107232 vs 32 [ 718.846568][T16750] EXT4-fs (loop4): inodes count not valid: 1056964640 vs 32 10:58:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000007403000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 718.861958][T16737] EXT4-fs (loop3): inodes count not valid: 1048608 vs 32 [ 718.862731][T16765] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c9004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000404000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 718.962850][T16784] loop0: detected capacity change from 512 to 0 10:58:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200011004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 719.099706][T16784] EXT4-fs (loop0): Test dummy encryption mode enabled [ 719.110954][T16784] EXT4-fs (loop0): bad geometry: block count 786496 exceeds size of device (64 blocks) [ 719.145736][T16793] loop5: detected capacity change from 512 to 0 [ 719.156098][T16794] loop2: detected capacity change from 512 to 0 [ 719.166364][T16794] EXT4-fs (loop2): Test dummy encryption mode enabled [ 719.192946][T16794] EXT4-fs (loop2): bad geometry: block count 1946157120 exceeds size of device (64 blocks) [ 719.208463][T16803] loop3: detected capacity change from 512 to 0 [ 719.222537][T16793] EXT4-fs (loop5): Test dummy encryption mode enabled [ 719.227506][T16795] loop4: detected capacity change from 512 to 0 10:58:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000d0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000007903000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 719.258238][T16806] loop1: detected capacity change from 512 to 0 [ 719.265839][T16793] EXT4-fs (loop5): inodes count not valid: 13172768 vs 32 [ 719.280577][T16795] EXT4-fs (loop4): Test dummy encryption mode enabled [ 719.288439][T16795] EXT4-fs (loop4): inodes count not valid: 1073741856 vs 32 [ 719.324502][T16806] EXT4-fs (loop1): Test dummy encryption mode enabled [ 719.331641][T16803] EXT4-fs (loop3): Test dummy encryption mode enabled [ 719.362960][T16803] EXT4-fs (loop3): inodes count not valid: 1114144 vs 32 10:58:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200003454000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 719.370910][T16806] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 719.474480][T16820] loop0: detected capacity change from 512 to 0 10:58:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000ca004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40048, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 719.563373][T16822] loop2: detected capacity change from 512 to 0 [ 719.573908][T16822] EXT4-fs (loop2): Test dummy encryption mode enabled [ 719.581696][T16822] EXT4-fs (loop2): bad geometry: block count 2030043200 exceeds size of device (64 blocks) 10:58:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000007a03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 719.613368][T16803] loop3: detected capacity change from 512 to 0 [ 719.621160][T16820] EXT4-fs (loop0): Test dummy encryption mode enabled [ 719.637076][T16803] EXT4-fs (loop3): Test dummy encryption mode enabled [ 719.643253][T16835] loop4: detected capacity change from 512 to 0 [ 719.651346][T16803] EXT4-fs (loop3): inodes count not valid: 1114144 vs 32 [ 719.651551][T16820] EXT4-fs (loop0): bad geometry: block count 852032 exceeds size of device (64 blocks) 10:58:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200012004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 719.725082][T16836] loop5: detected capacity change from 512 to 0 [ 719.732322][T16835] EXT4-fs (loop4): Test dummy encryption mode enabled [ 719.746137][T16835] EXT4-fs (loop4): inodes count not valid: 1157824544 vs 32 10:58:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000e0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 719.821484][T16836] EXT4-fs (loop5): Test dummy encryption mode enabled [ 719.844841][T16836] EXT4-fs (loop5): inodes count not valid: 13238304 vs 32 10:58:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000484000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 719.963285][T16853] loop1: detected capacity change from 512 to 0 [ 719.969942][T16836] loop5: detected capacity change from 512 to 0 [ 719.983731][T16854] loop2: detected capacity change from 512 to 0 [ 719.992085][T16853] EXT4-fs (loop1): Test dummy encryption mode enabled [ 720.001885][T16853] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 720.003151][T16836] EXT4-fs (loop5): Test dummy encryption mode enabled [ 720.026210][T16852] loop3: detected capacity change from 512 to 0 [ 720.048963][T16869] loop0: detected capacity change from 512 to 0 [ 720.057040][T16854] EXT4-fs (loop2): Test dummy encryption mode enabled 10:58:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40032, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 720.065057][T16854] EXT4-fs (loop2): bad geometry: block count 2046820416 exceeds size of device (64 blocks) [ 720.076032][T16870] loop4: detected capacity change from 512 to 0 [ 720.091494][T16836] EXT4-fs (loop5): inodes count not valid: 13238304 vs 32 [ 720.105364][T16869] EXT4-fs (loop0): Test dummy encryption mode enabled [ 720.114148][T16852] EXT4-fs (loop3): Test dummy encryption mode enabled [ 720.129030][T16852] EXT4-fs (loop3): inodes count not valid: 1179680 vs 32 [ 720.132463][T16869] EXT4-fs (loop0): bad geometry: block count 917568 exceeds size of device (64 blocks) [ 720.173523][T16870] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2001e9004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200018004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000f0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 720.214600][T16870] EXT4-fs (loop4): inodes count not valid: 1207959584 vs 32 10:58:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000008903000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 720.383994][T16883] loop1: detected capacity change from 512 to 0 [ 720.487863][T16888] loop2: detected capacity change from 512 to 0 [ 720.508504][T16870] loop4: detected capacity change from 512 to 0 [ 720.516775][T16883] EXT4-fs (loop1): Test dummy encryption mode enabled [ 720.531690][T16888] EXT4-fs (loop2): Test dummy encryption mode enabled [ 720.550499][T16894] loop3: detected capacity change from 512 to 0 [ 720.558359][T16883] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 720.571126][T16888] EXT4-fs (loop2): bad geometry: block count 2298478656 exceeds size of device (64 blocks) [ 720.584993][T16870] EXT4-fs (loop4): Test dummy encryption mode enabled [ 720.598669][T16904] loop5: detected capacity change from 512 to 0 [ 720.598767][T16870] EXT4-fs (loop4): inodes count not valid: 1207959584 vs 32 [ 720.619020][T16898] loop0: detected capacity change from 512 to 0 [ 720.631403][T16904] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000004c4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 720.642667][T16894] EXT4-fs (loop3): Test dummy encryption mode enabled [ 720.655279][T16898] EXT4-fs (loop0): Test dummy encryption mode enabled 10:58:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40025, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400001a003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 720.702009][T16904] EXT4-fs (loop5): inodes count not valid: 15270176 vs 32 [ 720.719914][T16894] EXT4-fs (loop3): inodes count not valid: 1572896 vs 32 [ 720.733766][T16898] EXT4-fs (loop0): bad geometry: block count 983104 exceeds size of device (64 blocks) 10:58:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004004100003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 720.892415][T16894] loop3: detected capacity change from 512 to 0 10:58:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2002ec004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 720.947987][T16917] loop4: detected capacity change from 512 to 0 [ 720.979467][T16894] EXT4-fs (loop3): Test dummy encryption mode enabled [ 720.987750][T16894] EXT4-fs (loop3): inodes count not valid: 1572896 vs 32 [ 721.007309][T16917] EXT4-fs (loop4): Test dummy encryption mode enabled [ 721.010730][T16928] loop2: detected capacity change from 512 to 0 [ 721.022160][T16917] EXT4-fs (loop4): inodes count not valid: 1275068448 vs 32 [ 721.033880][T16931] loop1: detected capacity change from 512 to 0 10:58:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20001c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 721.114347][T16931] EXT4-fs (loop1): Test dummy encryption mode enabled [ 721.123062][T16937] loop5: detected capacity change from 512 to 0 [ 721.129881][T16928] EXT4-fs (loop2): Test dummy encryption mode enabled [ 721.141824][T16928] EXT4-fs (loop2): bad geometry: block count 2684420160 exceeds size of device (64 blocks) [ 721.155155][T16931] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 721.155646][T16932] loop0: detected capacity change from 512 to 0 [ 721.183018][T16937] EXT4-fs (loop5): Test dummy encryption mode enabled [ 721.205343][T16937] EXT4-fs (loop5): inodes count not valid: 15467040 vs 32 10:58:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000034d4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40021, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 721.275821][T16932] EXT4-fs (loop0): Test dummy encryption mode enabled [ 721.297261][T16932] EXT4-fs (loop0): bad geometry: block count 1049664 exceeds size of device (64 blocks) 10:58:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004020100003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 721.359998][T16937] loop5: detected capacity change from 512 to 0 [ 721.376459][T16937] EXT4-fs (loop5): Test dummy encryption mode enabled [ 721.391919][T16937] EXT4-fs (loop5): inodes count not valid: 15467040 vs 32 10:58:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400001f803000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 721.453357][T16959] loop3: detected capacity change from 512 to 0 [ 721.460538][T16957] loop4: detected capacity change from 512 to 0 10:58:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2003f0004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 721.512730][T16960] loop1: detected capacity change from 512 to 0 [ 721.526805][T16960] EXT4-fs (loop1): Test dummy encryption mode enabled [ 721.532723][T16959] EXT4-fs (loop3): Test dummy encryption mode enabled [ 721.541346][T16957] EXT4-fs (loop4): Test dummy encryption mode enabled [ 721.551906][T16960] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 721.573814][T16959] EXT4-fs (loop3): inodes count not valid: 1835040 vs 32 [ 721.584161][T16957] EXT4-fs (loop4): inodes count not valid: 1292042272 vs 32 [ 721.605887][T16971] loop0: detected capacity change from 512 to 0 10:58:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40011, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 721.621265][T16973] loop2: detected capacity change from 512 to 0 [ 721.683341][T16971] EXT4-fs (loop0): Test dummy encryption mode enabled [ 721.690526][T16971] EXT4-fs (loop0): bad geometry: block count 1056832 exceeds size of device (64 blocks) [ 721.727991][T16973] EXT4-fs (loop2): Test dummy encryption mode enabled [ 721.735727][T16979] loop5: detected capacity change from 512 to 0 [ 721.736523][T16973] EXT4-fs (loop2): bad geometry: block count 4160815168 exceeds size of device (64 blocks) 10:58:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000110003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 721.775905][T16979] EXT4-fs (loop5): Test dummy encryption mode enabled [ 721.794005][T16959] loop3: detected capacity change from 512 to 0 [ 721.801453][T16979] EXT4-fs (loop5): inodes count not valid: 15729440 vs 32 [ 721.817416][T16957] loop4: detected capacity change from 512 to 0 10:58:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000fff03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 721.868277][T16959] EXT4-fs (loop3): Test dummy encryption mode enabled [ 721.880376][T16959] EXT4-fs (loop3): inodes count not valid: 1835040 vs 32 [ 721.902881][T16992] loop1: detected capacity change from 512 to 0 10:58:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200021004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 721.962549][T16957] EXT4-fs (loop4): Test dummy encryption mode enabled [ 721.969857][T16957] EXT4-fs (loop4): inodes count not valid: 1292042272 vs 32 10:58:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000005c4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 722.054272][T16979] loop5: detected capacity change from 512 to 0 [ 722.061569][T16979] EXT4-fs (loop5): Test dummy encryption mode enabled [ 722.067804][T17002] loop0: detected capacity change from 512 to 0 [ 722.076646][T16979] EXT4-fs (loop5): inodes count not valid: 15729440 vs 32 [ 722.087137][T16992] EXT4-fs (loop1): Test dummy encryption mode enabled [ 722.096844][T16992] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 722.119251][T17005] loop2: detected capacity change from 512 to 0 [ 722.127897][T17002] EXT4-fs (loop0): Test dummy encryption mode enabled 10:58:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2001f8004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 722.153839][T17002] EXT4-fs (loop0): bad geometry: block count 1114176 exceeds size of device (64 blocks) 10:58:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40010, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 722.203125][T17005] EXT4-fs (loop2): Test dummy encryption mode enabled [ 722.210221][T17005] EXT4-fs (loop2): bad geometry: block count 4279173184 exceeds size of device (64 blocks) 10:58:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004002110003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000004000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 722.378561][T17018] loop4: detected capacity change from 512 to 0 [ 722.388197][T17017] loop3: detected capacity change from 512 to 0 [ 722.408162][T17026] loop5: detected capacity change from 512 to 0 [ 722.423830][T17029] loop0: detected capacity change from 512 to 0 [ 722.443024][T17018] EXT4-fs (loop4): Test dummy encryption mode enabled [ 722.454766][T17018] EXT4-fs (loop4): inodes count not valid: 1543503904 vs 32 [ 722.454801][T17040] loop1: detected capacity change from 512 to 0 [ 722.483643][T17029] EXT4-fs (loop0): Test dummy encryption mode enabled [ 722.490825][T17017] EXT4-fs (loop3): Test dummy encryption mode enabled [ 722.497961][T17026] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000025f4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 722.534200][T17017] EXT4-fs (loop3): inodes count not valid: 2162720 vs 32 [ 722.541470][T17029] EXT4-fs (loop0): bad geometry: block count 1114688 exceeds size of device (64 blocks) [ 722.552052][T17026] EXT4-fs (loop5): inodes count not valid: 16253216 vs 32 10:58:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000000420000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000120003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 722.624674][T17040] EXT4-fs (loop1): Test dummy encryption mode enabled [ 722.641407][T17040] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 722.669145][T17017] loop3: detected capacity change from 512 to 0 10:58:34 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newqdisc={0x60, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x30, 0x2, {{0x0, 0xff, 0x0, 0x9}, [@TCA_NETEM_RATE={0x14, 0x6, {0x1}}]}}}]}, 0x60}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0xe, &(0x7f0000000180)={@remote, r6}, 0x14) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)={0x6, 0x0, [{0xd, 0x750, 0x8, 0x9, 0x10000}, {0x80000019, 0xffffffff, 0x3, 0x1, 0xfffffff7}, {0x4, 0x7, 0x80, 0x80, 0x3}, {0x0, 0xfffffffa, 0x8, 0x9, 0x8}, {0xb, 0x80000001, 0x8, 0x1, 0x400}, {0xb, 0x10000, 0xda2a, 0x2, 0xceaf}]}) close(r4) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=@ipv6_newaddrlabel={0x1c, 0x48, 0x88065d324f6f653f}, 0x1c}}, 0x0) r8 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r8) write(r8, &(0x7f0000000140)="05e58bf9", 0x4) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe6, 0x0) [ 722.701344][T17017] EXT4-fs (loop3): Test dummy encryption mode enabled [ 722.717127][T17017] EXT4-fs (loop3): inodes count not valid: 2162720 vs 32 [ 722.726717][T17057] loop0: detected capacity change from 512 to 0 10:58:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2003f8004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 722.746771][T17059] loop4: detected capacity change from 512 to 0 [ 722.767227][T17061] loop2: detected capacity change from 512 to 0 10:58:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200025004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 722.797678][T17057] EXT4-fs (loop0): Test dummy encryption mode enabled [ 722.812683][T17057] EXT4-fs (loop0): bad geometry: block count 1179712 exceeds size of device (64 blocks) [ 722.864714][T17061] EXT4-fs (loop2): Test dummy encryption mode enabled [ 722.864760][T17059] EXT4-fs (loop4): Test dummy encryption mode enabled [ 722.878601][T17061] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 722.894566][T17061] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 722.915997][T17059] EXT4-fs (loop4): inodes count not valid: 1593966624 vs 32 [ 722.917132][T17071] loop5: detected capacity change from 512 to 0 [ 722.933756][T17071] EXT4-fs (loop5): Test dummy encryption mode enabled [ 722.940924][T17061] EXT4-fs (loop2): get root inode failed [ 722.947124][T17071] EXT4-fs (loop5): inodes count not valid: 16253728 vs 32 [ 722.954391][T17061] EXT4-fs (loop2): mount failed 10:58:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040a9150003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000004200000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 723.002577][T17071] loop5: detected capacity change from 512 to 0 [ 723.133554][T17080] loop3: detected capacity change from 512 to 0 10:58:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200fff004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 723.253022][T17080] EXT4-fs (loop3): Test dummy encryption mode enabled [ 723.265936][T17089] loop2: detected capacity change from 512 to 0 [ 723.288927][T17097] loop0: detected capacity change from 512 to 0 10:58:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000005e00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 723.297809][T17080] EXT4-fs (loop3): inodes count not valid: 2424864 vs 32 [ 723.308172][T17059] loop4: detected capacity change from 512 to 0 [ 723.363157][T17089] EXT4-fs (loop2): Test dummy encryption mode enabled [ 723.363822][T17059] EXT4-fs (loop4): Test dummy encryption mode enabled [ 723.370442][T17097] EXT4-fs (loop0): Test dummy encryption mode enabled [ 723.401136][T17089] EXT4-fs (loop2): bad geometry: block count 1107296320 exceeds size of device (64 blocks) 10:58:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20002e004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000203000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 723.419333][T17059] EXT4-fs (loop4): inodes count not valid: 1593966624 vs 32 [ 723.428418][T17097] EXT4-fs (loop0): bad geometry: block count 1419584 exceeds size of device (64 blocks) [ 723.443857][T17108] loop5: detected capacity change from 512 to 0 10:58:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000604000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040ac150003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 723.548013][T17108] EXT4-fs (loop5): Test dummy encryption mode enabled [ 723.557049][T17108] EXT4-fs (loop5): bad geometry: block count 94 exceeds size of device (64 blocks) [ 723.583077][T17116] loop3: detected capacity change from 512 to 0 10:58:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x211b4, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 723.692465][T17116] EXT4-fs (loop3): Test dummy encryption mode enabled [ 723.706850][T17116] EXT4-fs (loop3): inodes count not valid: 3014688 vs 32 10:58:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000180003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 723.737067][T17124] loop2: detected capacity change from 512 to 0 [ 723.744117][T17108] loop5: detected capacity change from 512 to 0 [ 723.769003][T17131] loop1: detected capacity change from 264 to 0 [ 723.788677][T17134] loop4: detected capacity change from 512 to 0 [ 723.852703][T17124] EXT4-fs (loop2): Test dummy encryption mode enabled [ 723.860190][T17134] EXT4-fs (loop4): Test dummy encryption mode enabled [ 723.863002][T17131] EXT4-fs (loop1): Test dummy encryption mode enabled [ 723.867417][T17124] EXT4-fs (loop2): bad geometry: block count 33554496 exceeds size of device (64 blocks) [ 723.874132][T17108] EXT4-fs (loop5): Test dummy encryption mode enabled [ 723.888233][T17134] EXT4-fs (loop4): inodes count not valid: 1610612768 vs 32 [ 723.894197][T17139] loop0: detected capacity change from 512 to 0 [ 723.916689][T17108] EXT4-fs (loop5): bad geometry: block count 94 exceeds size of device (64 blocks) [ 723.928272][T17131] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (33 blocks) [ 723.937814][T17116] loop3: detected capacity change from 512 to 0 [ 724.053654][T17139] EXT4-fs (loop0): Test dummy encryption mode enabled [ 724.060734][T17139] EXT4-fs (loop0): bad geometry: block count 1572928 exceeds size of device (64 blocks) 10:58:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006f00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 724.182508][T17116] EXT4-fs (loop3): Test dummy encryption mode enabled [ 724.195522][T17116] EXT4-fs (loop3): inodes count not valid: 3014688 vs 32 [ 724.202706][T17134] loop4: detected capacity change from 512 to 0 [ 724.219021][T17134] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040011e0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x211b4, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 724.230489][T17134] EXT4-fs (loop4): inodes count not valid: 1610612768 vs 32 10:58:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000303000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200032004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 724.363087][T17158] loop5: detected capacity change from 512 to 0 [ 724.377139][T17161] loop1: detected capacity change from 264 to 0 10:58:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000684000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 724.466294][T17170] loop0: detected capacity change from 512 to 0 [ 724.473013][T17158] EXT4-fs (loop5): Test dummy encryption mode enabled [ 724.487183][T17158] EXT4-fs (loop5): bad geometry: block count 111 exceeds size of device (64 blocks) [ 724.495333][T17168] loop2: detected capacity change from 512 to 0 [ 724.511094][T17161] EXT4-fs (loop1): Test dummy encryption mode enabled [ 724.511302][T17170] EXT4-fs (loop0): Test dummy encryption mode enabled [ 724.525431][T17161] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (33 blocks) [ 724.538604][T17170] EXT4-fs (loop0): bad geometry: block count 1966400 exceeds size of device (64 blocks) [ 724.549415][T17168] EXT4-fs (loop2): Test dummy encryption mode enabled [ 724.561894][T17168] EXT4-fs (loop2): bad geometry: block count 50331712 exceeds size of device (64 blocks) 10:58:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1f9c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 724.703987][T17179] loop3: detected capacity change from 512 to 0 [ 724.731905][T17178] loop4: detected capacity change from 512 to 0 [ 724.750842][T17158] loop5: detected capacity change from 512 to 0 [ 724.764674][T17178] EXT4-fs (loop4): Test dummy encryption mode enabled [ 724.768853][T17179] EXT4-fs (loop3): Test dummy encryption mode enabled [ 724.788547][T17178] EXT4-fs (loop4): inodes count not valid: 1744830496 vs 32 10:58:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040001f0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 724.820042][T17158] EXT4-fs (loop5): Test dummy encryption mode enabled [ 724.846384][T17179] EXT4-fs (loop3): inodes count not valid: 3276832 vs 32 [ 724.859997][T17194] loop1: detected capacity change from 252 to 0 10:58:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000403000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 724.863965][T17158] EXT4-fs (loop5): bad geometry: block count 111 exceeds size of device (64 blocks) 10:58:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007f00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 724.967659][T17194] EXT4-fs (loop1): Test dummy encryption mode enabled [ 724.975112][T17194] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (31 blocks) [ 725.004289][T17178] loop4: detected capacity change from 512 to 0 [ 725.053009][T17179] loop3: detected capacity change from 512 to 0 [ 725.060423][T17205] loop0: detected capacity change from 512 to 0 [ 725.069868][T17204] loop2: detected capacity change from 512 to 0 [ 725.077747][T17178] EXT4-fs (loop4): Test dummy encryption mode enabled [ 725.086131][T17178] EXT4-fs (loop4): inodes count not valid: 1744830496 vs 32 [ 725.133926][T17204] EXT4-fs (loop2): Test dummy encryption mode enabled [ 725.147343][T17179] EXT4-fs (loop3): Test dummy encryption mode enabled [ 725.150379][T17205] EXT4-fs (loop0): Test dummy encryption mode enabled [ 725.158513][T17204] EXT4-fs (loop2): bad geometry: block count 67108928 exceeds size of device (64 blocks) [ 725.172645][T17205] EXT4-fs (loop0): bad geometry: block count 2031680 exceeds size of device (64 blocks) 10:58:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000006c4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040031f0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 725.174440][T17179] EXT4-fs (loop3): inodes count not valid: 3276832 vs 32 10:58:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200048004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000503000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 725.311717][T17221] loop5: detected capacity change from 512 to 0 [ 725.412686][T17222] loop4: detected capacity change from 512 to 0 [ 725.420244][T17221] EXT4-fs (loop5): Test dummy encryption mode enabled [ 725.428817][T17231] loop1: detected capacity change from 514 to 0 [ 725.439662][T17221] EXT4-fs (loop5): bad geometry: block count 127 exceeds size of device (64 blocks) [ 725.482828][T17228] loop0: detected capacity change from 512 to 0 [ 725.489895][T17222] EXT4-fs (loop4): Test dummy encryption mode enabled [ 725.496836][T17238] loop2: detected capacity change from 512 to 0 [ 725.508138][T17222] EXT4-fs (loop4): inodes count not valid: 1811939360 vs 32 [ 725.563758][T17228] EXT4-fs (loop0): Test dummy encryption mode enabled [ 725.570800][T17228] EXT4-fs (loop0): bad geometry: block count 2032448 exceeds size of device (64 blocks) [ 725.572551][T17231] EXT4-fs (loop1): Test dummy encryption mode enabled [ 725.589740][T17238] EXT4-fs (loop2): Test dummy encryption mode enabled [ 725.602080][T17238] EXT4-fs (loop2): bad geometry: block count 83886144 exceeds size of device (64 blocks) 10:58:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000200003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 725.642656][T17231] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 725.656171][T17246] loop3: detected capacity change from 512 to 0 [ 725.678722][T17221] loop5: detected capacity change from 512 to 0 [ 725.762581][T17246] EXT4-fs (loop3): Test dummy encryption mode enabled [ 725.776660][T17221] EXT4-fs (loop5): Test dummy encryption mode enabled [ 725.802200][T17222] loop4: detected capacity change from 512 to 0 10:58:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000c000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1f3c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000603000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 725.810490][T17222] EXT4-fs (loop4): Test dummy encryption mode enabled [ 725.822561][T17221] EXT4-fs (loop5): bad geometry: block count 127 exceeds size of device (64 blocks) [ 725.840967][T17246] EXT4-fs (loop3): inodes count not valid: 4718624 vs 32 [ 725.867395][T17222] EXT4-fs (loop4): inodes count not valid: 1811939360 vs 32 10:58:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000744000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 725.971195][T17263] loop0: detected capacity change from 512 to 0 [ 726.063165][T17263] EXT4-fs (loop0): Test dummy encryption mode enabled [ 726.070520][T17263] EXT4-fs (loop0): bad geometry: block count 2097216 exceeds size of device (64 blocks) [ 726.127601][T17272] loop5: detected capacity change from 512 to 0 [ 726.140096][T17265] loop2: detected capacity change from 512 to 0 [ 726.203133][T17272] EXT4-fs (loop5): Test dummy encryption mode enabled [ 726.203962][T17269] loop1: detected capacity change from 249 to 0 [ 726.223955][T17272] EXT4-fs (loop5): bad geometry: block count 192 exceeds size of device (64 blocks) [ 726.224066][T17265] EXT4-fs (loop2): Test dummy encryption mode enabled [ 726.240541][T17246] loop3: detected capacity change from 512 to 0 [ 726.284306][T17277] loop4: detected capacity change from 512 to 0 [ 726.311259][T17269] EXT4-fs (loop1): Test dummy encryption mode enabled [ 726.315553][T17277] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004010200003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000001f800000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 726.329124][T17265] EXT4-fs (loop2): bad geometry: block count 100663360 exceeds size of device (64 blocks) [ 726.339172][T17277] EXT4-fs (loop4): inodes count not valid: 1946157088 vs 32 [ 726.360989][T17269] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (31 blocks) 10:58:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20004c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 726.532661][T17294] loop0: detected capacity change from 512 to 0 [ 726.545876][T17296] loop5: detected capacity change from 512 to 0 [ 726.609630][T17277] loop4: detected capacity change from 512 to 0 [ 726.617714][T17296] EXT4-fs (loop5): Test dummy encryption mode enabled [ 726.627929][T17294] EXT4-fs (loop0): Test dummy encryption mode enabled [ 726.639516][T17277] EXT4-fs (loop4): Test dummy encryption mode enabled [ 726.649908][T17296] EXT4-fs (loop5): bad geometry: block count 248 exceeds size of device (64 blocks) 10:58:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20e40, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000703000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 726.671428][T17294] EXT4-fs (loop0): bad geometry: block count 2101312 exceeds size of device (64 blocks) [ 726.698944][T17277] EXT4-fs (loop4): inodes count not valid: 1946157088 vs 32 [ 726.741879][T17310] loop3: detected capacity change from 512 to 0 10:58:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000794000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 726.840007][T17314] loop1: detected capacity change from 263 to 0 [ 726.872355][T17310] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000210003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 726.892808][T17310] EXT4-fs (loop3): inodes count not valid: 4980768 vs 32 [ 726.900928][T17296] loop5: detected capacity change from 512 to 0 [ 726.926591][T17314] EXT4-fs (loop1): Test dummy encryption mode enabled [ 726.937029][T17296] EXT4-fs (loop5): Test dummy encryption mode enabled [ 726.946804][T17314] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (32 blocks) [ 726.957391][T17296] EXT4-fs (loop5): bad geometry: block count 248 exceeds size of device (64 blocks) [ 726.981446][T17327] loop4: detected capacity change from 512 to 0 [ 727.083505][T17331] loop0: detected capacity change from 512 to 0 [ 727.090083][T17322] loop2: detected capacity change from 512 to 0 [ 727.121833][T17327] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200003fff800000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 727.131412][T17327] EXT4-fs (loop4): inodes count not valid: 2030043168 vs 32 10:58:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1f080, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 727.173036][T17331] EXT4-fs (loop0): Test dummy encryption mode enabled [ 727.182047][T17331] EXT4-fs (loop0): bad geometry: block count 2162752 exceeds size of device (64 blocks) [ 727.188910][T17310] loop3: detected capacity change from 512 to 0 [ 727.205356][T17322] EXT4-fs (loop2): Test dummy encryption mode enabled [ 727.238140][T17322] EXT4-fs (loop2): bad geometry: block count 117440576 exceeds size of device (64 blocks) [ 727.387639][T17344] loop1: detected capacity change from 248 to 0 10:58:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20005c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000250003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 727.455140][T17344] EXT4-fs (loop1): Test dummy encryption mode enabled 10:58:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000803000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 727.515469][T17344] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (31 blocks) [ 727.538646][T17355] loop3: detected capacity change from 512 to 0 10:58:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000007a4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 727.560934][T17356] loop5: detected capacity change from 512 to 0 [ 727.593394][T17355] EXT4-fs (loop3): Test dummy encryption mode enabled [ 727.605121][T17355] EXT4-fs (loop3): inodes count not valid: 6029344 vs 32 [ 727.622255][T17364] loop2: detected capacity change from 512 to 0 [ 727.629032][T17356] EXT4-fs (loop5): Test dummy encryption mode enabled [ 727.631004][T17364] EXT4-fs (loop2): Test dummy encryption mode enabled 10:58:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 727.643328][T17363] loop0: detected capacity change from 512 to 0 [ 727.664219][T17364] EXT4-fs (loop2): bad geometry: block count 134217792 exceeds size of device (64 blocks) [ 727.671059][T17356] EXT4-fs (loop5): bad geometry: block count 248 exceeds size of device (64 blocks) [ 727.712061][T17355] loop3: detected capacity change from 512 to 0 [ 727.719198][T17363] EXT4-fs (loop0): Test dummy encryption mode enabled [ 727.735901][T17363] EXT4-fs (loop0): bad geometry: block count 2424896 exceeds size of device (64 blocks) [ 727.755545][T17373] loop4: detected capacity change from 512 to 0 [ 727.818437][T17355] EXT4-fs (loop3): Test dummy encryption mode enabled [ 727.825647][T17355] EXT4-fs (loop3): inodes count not valid: 6029344 vs 32 10:58:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200060004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000903000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 727.864633][T17373] EXT4-fs (loop4): Test dummy encryption mode enabled [ 727.881772][T17356] loop5: detected capacity change from 512 to 0 [ 727.882872][T17373] EXT4-fs (loop4): inodes count not valid: 2046820384 vs 32 [ 727.925504][T17383] loop1: detected capacity change from 260 to 0 [ 727.953740][T17356] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040002e0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 727.973521][T17356] EXT4-fs (loop5): bad geometry: block count 248 exceeds size of device (64 blocks) [ 728.033681][T17383] EXT4-fs (loop1): Test dummy encryption mode enabled [ 728.041562][T17383] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (32 blocks) 10:58:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="207fffffff00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 728.122511][T17394] loop2: detected capacity change from 512 to 0 10:58:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200002854000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 728.177452][T17398] loop0: detected capacity change from 512 to 0 [ 728.190226][T17394] EXT4-fs (loop2): Test dummy encryption mode enabled [ 728.210245][T17398] EXT4-fs (loop0): Test dummy encryption mode enabled 10:58:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1f000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 728.235288][T17394] EXT4-fs (loop2): bad geometry: block count 150995008 exceeds size of device (64 blocks) [ 728.253688][T17398] EXT4-fs (loop0): bad geometry: block count 3014720 exceeds size of device (64 blocks) 10:58:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000310003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 728.283911][T17407] loop5: detected capacity change from 512 to 0 [ 728.298918][T17406] loop3: detected capacity change from 512 to 0 [ 728.317077][T17407] EXT4-fs (loop5): Test dummy encryption mode enabled [ 728.325803][T17407] EXT4-fs (loop5): bad geometry: block count 255 exceeds size of device (64 blocks) 10:58:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000a03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 728.401294][T17418] loop4: detected capacity change from 512 to 0 [ 728.409707][T17419] loop1: detected capacity change from 248 to 0 [ 728.436097][T17406] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200002004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 728.450244][T17418] EXT4-fs (loop4): Test dummy encryption mode enabled [ 728.454949][T17406] EXT4-fs (loop3): inodes count not valid: 6291488 vs 32 [ 728.460038][T17418] EXT4-fs (loop4): inodes count not valid: 2231500832 vs 32 [ 728.473211][T17419] EXT4-fs (loop1): Test dummy encryption mode enabled [ 728.514132][T17419] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (31 blocks) [ 728.541829][T17418] loop4: detected capacity change from 512 to 0 [ 728.582947][T17428] loop0: detected capacity change from 512 to 0 [ 728.591265][T17432] loop2: detected capacity change from 512 to 0 [ 728.599363][T17433] loop5: detected capacity change from 512 to 0 [ 728.632698][T17428] EXT4-fs (loop0): Test dummy encryption mode enabled [ 728.641421][T17428] EXT4-fs (loop0): bad geometry: block count 3211328 exceeds size of device (64 blocks) [ 728.642220][T17418] EXT4-fs (loop4): Test dummy encryption mode enabled [ 728.664062][T17406] loop3: detected capacity change from 512 to 0 [ 728.672972][T17432] EXT4-fs (loop2): Test dummy encryption mode enabled 10:58:40 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_mount_image$vxfs(&(0x7f00000000c0)='vxfs\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000180)='1^', 0x2, 0x9928}, {&(0x7f00000001c0)="96b43014f5b0428b35803e46a80093ed69b8da5005275421fe0305e342bb08f7f00d99c4a024cc0b1c6bf31fb56055402825cd3c3c2a6432f668f8682cad154b1c42b54d76cf05bc95dfa29d9e7608a79f706a7a67d63a26ca6a65e861c25e5ac6c897099e77c6", 0x67, 0x80}, {&(0x7f0000000240)="efa5b591b7c902ae89fff9f3b308a46fc39f79998b1e99460af43733a0002f33a301feb3dd7be40fc41bf84125c74f57cfd83ee9c792c9c6daec877a477a1b50d5c3aac74b34a096dd949a345144888c09e9d47f2bf8713b313ec981469caf091a4034250cc221d603b569ecc2ea7fd3460f3a274a52e27f477508ab1eac789551599adea701bf660e995ae24edfb7c4a541e9a042ad4751c7edb735fad6c458ce3fe18e", 0xa4, 0x6b7c}, {&(0x7f0000000300)="8a3567f036f6f1eea423f1513f8e8f67a5f6460783426f51f227a8a0fb93fa9ef22957919fae8467e95ec6dbfb4a909c8dbed86eb8efc4dc7aebe7811a20744a04cad225c61d57c026e9b890afd352c662da5b6d0a040df2628ff3d55238aba38e824e121fe60694b6a7313b770ad7822063b97e80996484a4f4ef1861a6bf11a0957c263ca83ef31ed11ea072f7027782e2f0f99ebb942509af", 0x9a, 0xfffffffffffff6ed}], 0x800800, &(0x7f0000000540)={[{'/dev/dlm-monitor\x00'}, {'/dev/dlm-monitor\x00'}, {'/dev/dlm-monitor\x00'}, {'\xa5\''}, {'\x10\xbc\x92G5^$\xb7{\x13\xc1\x95\xf1\xf2\xd6\xc9\x7f\x1b\x89\xb7\xc3\xeb\fC\xd2\xd5\xdfKM\x92\xf5\x95\xf1Jj\"_\xc5\x90H0\x90\xb1\xbf\x8b\xb2I\x90\x91\xdc\x89b\xad-6@\x8e\xe7\x90\x8f\xb3M>\xcf\xc06|\xa9\x7f\x96e\xbf\xa6+P\xcf\xef\\l\xf6\"\xcf\x1f\x12\xb5j\xfe\xebQ@?\x02\x9e\xe0\xdd\x03\xea'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/dlm-monitor\x00'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}, {@appraise='appraise'}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x8002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=@ipv6_newaddrlabel={0x1c, 0x48, 0x88065d324f6f653f}, 0x1c}}, 0x0) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r4, 0x0, r6, 0x0, 0x4ffe6, 0x0) 10:58:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000320003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 728.679954][T17418] EXT4-fs (loop4): inodes count not valid: 2231500832 vs 32 [ 728.680433][T17433] EXT4-fs (loop5): Test dummy encryption mode enabled [ 728.711269][T17432] EXT4-fs (loop2): bad geometry: block count 167772224 exceeds size of device (64 blocks) [ 728.725623][T17433] EXT4-fs (loop5): inodes count not valid: 131104 vs 32 10:58:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000894000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 728.752850][T17406] EXT4-fs (loop3): Test dummy encryption mode enabled [ 728.765268][T17406] EXT4-fs (loop3): inodes count not valid: 6291488 vs 32 10:58:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200068004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 728.913680][T17456] loop0: detected capacity change from 512 to 0 [ 728.931457][T17455] loop1: detected capacity change from 16374 to 0 [ 728.941135][T17455] vxfs: WRONG superblock magic 00000000 at 1 [ 728.947570][T17455] vxfs: WRONG superblock magic 00000000 at 8 [ 728.953680][T17455] vxfs: can't find superblock. [ 728.961350][T17456] EXT4-fs (loop0): Test dummy encryption mode enabled [ 728.978145][T17456] EXT4-fs (loop0): bad geometry: block count 3276864 exceeds size of device (64 blocks) [ 728.998833][T17433] loop5: detected capacity change from 512 to 0 10:58:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000b03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040003d0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 729.012102][T17433] EXT4-fs (loop5): Test dummy encryption mode enabled [ 729.020503][T17433] EXT4-fs (loop5): inodes count not valid: 131104 vs 32 10:58:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200003004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 729.085203][T17472] loop4: detected capacity change from 512 to 0 [ 729.117025][T17472] EXT4-fs (loop4): Test dummy encryption mode enabled [ 729.126635][T17474] loop3: detected capacity change from 512 to 0 [ 729.133069][T17472] EXT4-fs (loop4): inodes count not valid: 2298478624 vs 32 [ 729.148909][T17480] loop2: detected capacity change from 512 to 0 [ 729.194432][T17480] EXT4-fs (loop2): Test dummy encryption mode enabled [ 729.195426][T17474] EXT4-fs (loop3): Test dummy encryption mode enabled [ 729.208356][T17488] loop0: detected capacity change from 512 to 0 [ 729.219867][T17480] EXT4-fs (loop2): bad geometry: block count 184549440 exceeds size of device (64 blocks) [ 729.229985][T17474] EXT4-fs (loop3): inodes count not valid: 6815776 vs 32 [ 729.239163][T17490] loop5: detected capacity change from 512 to 0 [ 729.250918][T17490] EXT4-fs (loop5): Test dummy encryption mode enabled [ 729.256620][T17488] EXT4-fs (loop0): Test dummy encryption mode enabled [ 729.264821][T17490] EXT4-fs (loop5): inodes count not valid: 196640 vs 32 [ 729.272349][T17472] loop4: detected capacity change from 512 to 0 [ 729.279829][T17488] EXT4-fs (loop0): bad geometry: block count 3997760 exceeds size of device (64 blocks) [ 729.393200][T17472] EXT4-fs (loop4): Test dummy encryption mode enabled [ 729.400740][T17472] EXT4-fs (loop4): inodes count not valid: 2298478624 vs 32 [ 729.468728][T17490] loop5: detected capacity change from 512 to 0 [ 729.506359][T17474] loop3: detected capacity change from 512 to 0 10:58:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000029d4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000c03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 729.523577][T17490] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040003f0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 729.576992][T17490] EXT4-fs (loop5): inodes count not valid: 196640 vs 32 [ 729.584669][T17474] EXT4-fs (loop3): Test dummy encryption mode enabled [ 729.593488][T17474] EXT4-fs (loop3): inodes count not valid: 6815776 vs 32 10:58:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x206e1, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20006c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 729.635691][T17512] loop2: detected capacity change from 512 to 0 [ 729.663236][T17513] loop4: detected capacity change from 512 to 0 [ 729.671539][T17513] EXT4-fs (loop4): Test dummy encryption mode enabled [ 729.693303][T17513] EXT4-fs (loop4): inodes count not valid: 2634154016 vs 32 [ 729.724094][T17512] EXT4-fs (loop2): Test dummy encryption mode enabled [ 729.731222][T17512] EXT4-fs (loop2): bad geometry: block count 201326656 exceeds size of device (64 blocks) [ 729.832456][T17521] loop0: detected capacity change from 512 to 0 [ 729.839404][T17522] loop1: detected capacity change from 259 to 0 [ 729.965137][T17521] EXT4-fs (loop0): Test dummy encryption mode enabled [ 729.978762][T17513] loop4: detected capacity change from 512 to 0 [ 729.988495][T17521] EXT4-fs (loop0): bad geometry: block count 4128832 exceeds size of device (64 blocks) [ 730.002958][T17526] loop3: detected capacity change from 512 to 0 [ 730.018028][T17513] EXT4-fs (loop4): Test dummy encryption mode enabled [ 730.025474][T17522] EXT4-fs (loop1): Test dummy encryption mode enabled [ 730.080195][T17522] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (32 blocks) [ 730.096084][T17513] EXT4-fs (loop4): inodes count not valid: 2634154016 vs 32 [ 730.113241][T17526] EXT4-fs (loop3): Test dummy encryption mode enabled [ 730.126335][T17543] loop5: detected capacity change from 512 to 0 10:58:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1ed1f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000d03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 730.182377][T17526] EXT4-fs (loop3): inodes count not valid: 7077920 vs 32 10:58:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000400003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1eb40, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200001a04000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200074004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 730.230679][T17543] EXT4-fs (loop5): Test dummy encryption mode enabled [ 730.260359][T17543] EXT4-fs (loop5): inodes count not valid: 262176 vs 32 [ 730.332049][T17552] loop0: detected capacity change from 512 to 0 [ 730.346905][T17551] loop2: detected capacity change from 512 to 0 [ 730.433107][T17551] EXT4-fs (loop2): Test dummy encryption mode enabled [ 730.440279][T17552] EXT4-fs (loop0): Test dummy encryption mode enabled [ 730.447171][T17551] EXT4-fs (loop2): bad geometry: block count 218103872 exceeds size of device (64 blocks) [ 730.458337][T17560] loop1: detected capacity change from 245 to 0 [ 730.459970][T17552] EXT4-fs (loop0): bad geometry: block count 4194368 exceeds size of device (64 blocks) [ 730.479763][T17561] loop4: detected capacity change from 512 to 0 [ 730.490247][T17565] loop3: detected capacity change from 512 to 0 [ 730.497532][T17560] EXT4-fs (loop1): Test dummy encryption mode enabled [ 730.514052][T17560] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (30 blocks) 10:58:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=@ipv6_newaddrlabel={0x1c, 0x48, 0x88065d324f6f653f}, 0x1c}}, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f00000001c0)={0xa, {0x3, 0x8, 0x3}}, 0xa) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000040)="704a01e2c9d43377171dd7b0dbd57b2d165b419e5b6f9df24bd81ac559a0966de6b1b3cd80bb9b3234cf300bdd2f8c94cc15e3cfbb00d631a0aff29820e1bb06ce296e7a31764dbbbd139f8e70401c023a464e8ca036483ceda07ee66d0225f8cb42eb207b372d6b10afd8ab3ba1fa138b3503e22b46a0f8132d8d3adfb142af1bc0f2309ae3dc7bdf2041b48accc5e2391406e8378b2137d6632bff5f6b0aca8656598078ebf54a", &(0x7f0000000140)=@udp=r3, 0x3}, 0x20) splice(r2, 0x0, r4, 0x0, 0x4ffe6, 0x0) 10:58:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000e03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 730.592753][T17561] EXT4-fs (loop4): Test dummy encryption mode enabled [ 730.599884][T17543] loop5: detected capacity change from 512 to 0 [ 730.610015][T17561] EXT4-fs (loop4): inodes count not valid: 2684420128 vs 32 [ 730.620037][T17565] EXT4-fs (loop3): Test dummy encryption mode enabled [ 730.635402][T17565] EXT4-fs (loop3): inodes count not valid: 7602208 vs 32 10:58:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000410003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200005004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 730.849864][T17565] loop3: detected capacity change from 512 to 0 [ 730.864961][T17561] loop4: detected capacity change from 512 to 0 [ 730.883545][T17588] loop2: detected capacity change from 512 to 0 [ 730.902676][T17592] loop0: detected capacity change from 512 to 0 [ 730.909691][T17565] EXT4-fs (loop3): Test dummy encryption mode enabled [ 730.922384][T17561] EXT4-fs (loop4): Test dummy encryption mode enabled [ 730.945703][T17588] EXT4-fs (loop2): Test dummy encryption mode enabled [ 730.955245][T17565] EXT4-fs (loop3): inodes count not valid: 7602208 vs 32 [ 730.964382][T17561] EXT4-fs (loop4): inodes count not valid: 2684420128 vs 32 [ 730.964424][T17600] loop5: detected capacity change from 512 to 0 [ 730.978529][T17588] EXT4-fs (loop2): bad geometry: block count 234881088 exceeds size of device (64 blocks) [ 730.991210][T17592] EXT4-fs (loop0): Test dummy encryption mode enabled 10:58:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200002a14000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 731.004319][T17592] EXT4-fs (loop0): bad geometry: block count 4259904 exceeds size of device (64 blocks) 10:58:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20007a004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 731.088885][T17600] EXT4-fs (loop5): Test dummy encryption mode enabled [ 731.099622][T17600] EXT4-fs (loop5): inodes count not valid: 327712 vs 32 10:58:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000480003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000f03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 731.299624][T17600] loop5: detected capacity change from 512 to 0 [ 731.322423][T17600] EXT4-fs (loop5): Test dummy encryption mode enabled [ 731.366108][T17600] EXT4-fs (loop5): inodes count not valid: 327712 vs 32 [ 731.424882][T17620] loop3: detected capacity change from 512 to 0 [ 731.464705][T17620] EXT4-fs (loop3): Test dummy encryption mode enabled [ 731.473912][T17620] EXT4-fs (loop3): inodes count not valid: 7995424 vs 32 10:58:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200006004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 731.521800][T17624] loop0: detected capacity change from 512 to 0 [ 731.534099][T17625] loop4: detected capacity change from 512 to 0 [ 731.548856][T17627] loop2: detected capacity change from 512 to 0 [ 731.564373][T17624] EXT4-fs (loop0): Test dummy encryption mode enabled [ 731.588984][T17624] EXT4-fs (loop0): bad geometry: block count 4718656 exceeds size of device (64 blocks) [ 731.634541][T17627] EXT4-fs (loop2): Test dummy encryption mode enabled [ 731.636709][T17625] EXT4-fs (loop4): Test dummy encryption mode enabled [ 731.654428][T17627] EXT4-fs (loop2): bad geometry: block count 251658304 exceeds size of device (64 blocks) [ 731.670612][T17620] loop3: detected capacity change from 512 to 0 10:58:43 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=@ipv6_newaddrlabel={0x1c, 0x48, 0x88065d324f6f653f}, 0x1c}}, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f00000001c0)={0xa, {0x3, 0x8, 0x3}}, 0xa) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000040)="704a01e2c9d43377171dd7b0dbd57b2d165b419e5b6f9df24bd81ac559a0966de6b1b3cd80bb9b3234cf300bdd2f8c94cc15e3cfbb00d631a0aff29820e1bb06ce296e7a31764dbbbd139f8e70401c023a464e8ca036483ceda07ee66d0225f8cb42eb207b372d6b10afd8ab3ba1fa138b3503e22b46a0f8132d8d3adfb142af1bc0f2309ae3dc7bdf2041b48accc5e2391406e8378b2137d6632bff5f6b0aca8656598078ebf54a", &(0x7f0000000140)=@udp=r3, 0x3}, 0x20) splice(r2, 0x0, r4, 0x0, 0x4ffe6, 0x0) [ 731.679707][T17620] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000490003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 731.704982][T17625] EXT4-fs (loop4): inodes count not valid: 2701262880 vs 32 [ 731.712623][T17620] EXT4-fs (loop3): inodes count not valid: 7995424 vs 32 10:58:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200089004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000001003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 731.906112][T17639] loop5: detected capacity change from 512 to 0 [ 731.924543][T17639] EXT4-fs (loop5): Test dummy encryption mode enabled [ 731.939618][T17625] loop4: detected capacity change from 512 to 0 [ 731.948635][T17639] EXT4-fs (loop5): inodes count not valid: 393248 vs 32 [ 731.992391][T17657] loop3: detected capacity change from 512 to 0 [ 731.992668][T17625] EXT4-fs (loop4): Test dummy encryption mode enabled [ 732.008633][T17656] loop2: detected capacity change from 512 to 0 [ 732.015573][T17625] EXT4-fs (loop4): inodes count not valid: 2701262880 vs 32 [ 732.052437][T17658] loop0: detected capacity change from 512 to 0 [ 732.062536][T17657] EXT4-fs (loop3): Test dummy encryption mode enabled [ 732.083815][T17657] EXT4-fs (loop3): inodes count not valid: 8978464 vs 32 10:58:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200003a54000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 732.113177][T17656] EXT4-fs (loop2): Test dummy encryption mode enabled [ 732.123361][T17658] EXT4-fs (loop0): Test dummy encryption mode enabled [ 732.131844][T17656] EXT4-fs (loop2): bad geometry: block count 268435520 exceeds size of device (64 blocks) [ 732.148936][T17639] loop5: detected capacity change from 512 to 0 [ 732.151843][T17658] EXT4-fs (loop0): bad geometry: block count 4784192 exceeds size of device (64 blocks) [ 732.195932][T17657] loop3: detected capacity change from 512 to 0 [ 732.223154][T17639] EXT4-fs (loop5): Test dummy encryption mode enabled [ 732.240989][T17657] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000001103000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040004c0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 732.272017][T17639] EXT4-fs (loop5): inodes count not valid: 393248 vs 32 [ 732.297664][T17657] EXT4-fs (loop3): inodes count not valid: 8978464 vs 32 [ 732.347172][T17679] loop4: detected capacity change from 512 to 0 10:58:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200007004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a0004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 732.462352][T17679] EXT4-fs (loop4): Test dummy encryption mode enabled [ 732.479884][T17679] EXT4-fs (loop4): inodes count not valid: 2768437280 vs 32 10:58:44 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=@ipv6_newaddrlabel={0x1c, 0x48, 0x88065d324f6f653f}, 0x1c}}, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f00000001c0)={0xa, {0x3, 0x8, 0x3}}, 0xa) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000040)="704a01e2c9d43377171dd7b0dbd57b2d165b419e5b6f9df24bd81ac559a0966de6b1b3cd80bb9b3234cf300bdd2f8c94cc15e3cfbb00d631a0aff29820e1bb06ce296e7a31764dbbbd139f8e70401c023a464e8ca036483ceda07ee66d0225f8cb42eb207b372d6b10afd8ab3ba1fa138b3503e22b46a0f8132d8d3adfb142af1bc0f2309ae3dc7bdf2041b48accc5e2391406e8378b2137d6632bff5f6b0aca8656598078ebf54a", &(0x7f0000000140)=@udp=r3, 0x3}, 0x20) splice(r2, 0x0, r4, 0x0, 0x4ffe6, 0x0) [ 732.550331][T17685] loop2: detected capacity change from 512 to 0 [ 732.616335][T17685] EXT4-fs (loop2): Test dummy encryption mode enabled [ 732.623282][T17685] EXT4-fs (loop2): bad geometry: block count 285212736 exceeds size of device (64 blocks) [ 732.643407][T17690] loop0: detected capacity change from 512 to 0 [ 732.663948][T17694] loop3: detected capacity change from 512 to 0 [ 732.715333][T17693] loop5: detected capacity change from 512 to 0 [ 732.737311][T17694] EXT4-fs (loop3): Test dummy encryption mode enabled [ 732.743877][T17690] EXT4-fs (loop0): Test dummy encryption mode enabled [ 732.751049][T17694] EXT4-fs (loop3): inodes count not valid: 10485792 vs 32 10:58:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000001203000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 732.770433][T17690] EXT4-fs (loop0): bad geometry: block count 4980800 exceeds size of device (64 blocks) 10:58:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000c04000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 732.815968][T17693] EXT4-fs (loop5): Test dummy encryption mode enabled [ 732.829984][T17693] EXT4-fs (loop5): inodes count not valid: 458784 vs 32 [ 732.926125][T17713] loop2: detected capacity change from 512 to 0 10:58:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000550003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 732.967394][T17713] EXT4-fs (loop2): Test dummy encryption mode enabled [ 732.980138][T17713] EXT4-fs (loop2): bad geometry: block count 301989952 exceeds size of device (64 blocks) [ 732.997679][T17694] loop3: detected capacity change from 512 to 0 10:58:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200008004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000001803000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 733.046645][T17694] EXT4-fs (loop3): Test dummy encryption mode enabled [ 733.047783][T17721] loop4: detected capacity change from 512 to 0 [ 733.084622][T17694] EXT4-fs (loop3): inodes count not valid: 10485792 vs 32 10:58:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a1004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 733.122267][T17721] EXT4-fs (loop4): Test dummy encryption mode enabled [ 733.130869][T17727] loop0: detected capacity change from 512 to 0 [ 733.142572][T17721] EXT4-fs (loop4): inodes count not valid: 3221225504 vs 32 [ 733.245710][T17727] EXT4-fs (loop0): Test dummy encryption mode enabled [ 733.251688][T17735] loop2: detected capacity change from 512 to 0 [ 733.254370][T17727] EXT4-fs (loop0): bad geometry: block count 5570624 exceeds size of device (64 blocks) [ 733.307360][T17734] loop5: detected capacity change from 512 to 0 [ 733.329140][T17735] EXT4-fs (loop2): Test dummy encryption mode enabled [ 733.337154][T17735] EXT4-fs (loop2): bad geometry: block count 402653248 exceeds size of device (64 blocks) [ 733.347680][T17721] loop4: detected capacity change from 512 to 0 [ 733.385666][T17734] EXT4-fs (loop5): Test dummy encryption mode enabled [ 733.392904][T17721] EXT4-fs (loop4): Test dummy encryption mode enabled [ 733.420106][T17721] EXT4-fs (loop4): inodes count not valid: 3221225504 vs 32 [ 733.429121][T17734] EXT4-fs (loop5): inodes count not valid: 524320 vs 32 10:58:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000001903000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040005c0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000e54000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1ecc0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200009004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 733.469839][T17748] loop3: detected capacity change from 512 to 0 [ 733.491203][T17748] EXT4-fs (loop3): Test dummy encryption mode enabled [ 733.505828][T17748] EXT4-fs (loop3): inodes count not valid: 10551328 vs 32 [ 733.643079][T17753] loop0: detected capacity change from 512 to 0 [ 733.649870][T17756] loop2: detected capacity change from 512 to 0 [ 733.683329][T17759] loop4: detected capacity change from 512 to 0 [ 733.704614][T17756] EXT4-fs (loop2): Test dummy encryption mode enabled [ 733.704703][T17753] EXT4-fs (loop0): Test dummy encryption mode enabled [ 733.722068][T17759] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a2004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 733.737689][T17756] EXT4-fs (loop2): bad geometry: block count 419430464 exceeds size of device (64 blocks) [ 733.749140][T17771] loop1: detected capacity change from 246 to 0 [ 733.761461][T17759] EXT4-fs (loop4): inodes count not valid: 3841982496 vs 32 [ 733.770886][T17753] EXT4-fs (loop0): bad geometry: block count 6029376 exceeds size of device (64 blocks) [ 733.786358][T17772] loop5: detected capacity change from 512 to 0 10:58:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000002103000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 733.875281][T17772] EXT4-fs (loop5): Test dummy encryption mode enabled [ 733.882641][T17771] EXT4-fs (loop1): Test dummy encryption mode enabled [ 733.890367][T17771] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (30 blocks) [ 733.904868][T17772] EXT4-fs (loop5): inodes count not valid: 589856 vs 32 10:58:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000600003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 733.922680][T17759] loop4: detected capacity change from 512 to 0 [ 733.982227][T17782] loop3: detected capacity change from 512 to 0 [ 733.991443][T17759] EXT4-fs (loop4): Test dummy encryption mode enabled [ 734.007998][T17759] EXT4-fs (loop4): inodes count not valid: 3841982496 vs 32 [ 734.022485][T17782] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1e3c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 734.029668][T17782] EXT4-fs (loop3): inodes count not valid: 10616864 vs 32 10:58:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000e64000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 734.122243][T17793] loop2: detected capacity change from 512 to 0 [ 734.129029][T17794] loop0: detected capacity change from 512 to 0 [ 734.156637][T17797] loop1: detected capacity change from 241 to 0 [ 734.164204][T17793] EXT4-fs (loop2): Test dummy encryption mode enabled [ 734.171420][T17794] EXT4-fs (loop0): Test dummy encryption mode enabled [ 734.184449][T17794] EXT4-fs (loop0): bad geometry: block count 6291520 exceeds size of device (64 blocks) [ 734.188187][T17782] loop3: detected capacity change from 512 to 0 [ 734.209528][T17793] EXT4-fs (loop2): bad geometry: block count 553648192 exceeds size of device (64 blocks) 10:58:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004001670003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000002503000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000a004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 734.309267][T17797] EXT4-fs (loop1): Test dummy encryption mode enabled [ 734.316381][T17782] EXT4-fs (loop3): Test dummy encryption mode enabled [ 734.323814][T17797] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (30 blocks) [ 734.333874][T17782] EXT4-fs (loop3): inodes count not valid: 10616864 vs 32 [ 734.347219][T17809] loop4: detected capacity change from 512 to 0 10:58:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a3004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 734.432472][T17809] EXT4-fs (loop4): Test dummy encryption mode enabled [ 734.434229][T17822] loop5: detected capacity change from 512 to 0 [ 734.439416][T17809] EXT4-fs (loop4): inodes count not valid: 3858759712 vs 32 10:58:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1e000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 734.505023][T17823] loop0: detected capacity change from 512 to 0 [ 734.515595][T17821] loop2: detected capacity change from 512 to 0 [ 734.541767][T17822] EXT4-fs (loop5): Test dummy encryption mode enabled [ 734.551008][T17823] EXT4-fs (loop0): Test dummy encryption mode enabled [ 734.558060][T17823] EXT4-fs (loop0): bad geometry: block count 6750528 exceeds size of device (64 blocks) [ 734.566765][T17822] EXT4-fs (loop5): inodes count not valid: 655392 vs 32 10:58:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000680003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 734.603251][T17821] EXT4-fs (loop2): Test dummy encryption mode enabled [ 734.612505][T17821] EXT4-fs (loop2): bad geometry: block count 620757056 exceeds size of device (64 blocks) [ 734.624221][T17809] loop4: detected capacity change from 512 to 0 [ 734.637188][T17834] loop1: detected capacity change from 240 to 0 [ 734.682557][T17809] EXT4-fs (loop4): Test dummy encryption mode enabled [ 734.696968][T17809] EXT4-fs (loop4): inodes count not valid: 3858759712 vs 32 [ 734.772364][T17834] EXT4-fs (loop1): Test dummy encryption mode enabled [ 734.776909][T17843] loop3: detected capacity change from 512 to 0 [ 734.786022][T17834] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (30 blocks) 10:58:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000e74000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000002e03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1e280, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000b004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 734.962339][T17851] loop0: detected capacity change from 512 to 0 [ 734.969386][T17843] EXT4-fs (loop3): Test dummy encryption mode enabled [ 734.982896][T17851] EXT4-fs (loop0): Test dummy encryption mode enabled [ 734.990893][T17843] EXT4-fs (loop3): inodes count not valid: 10682400 vs 32 [ 735.002879][T17851] EXT4-fs (loop0): bad geometry: block count 6815808 exceeds size of device (64 blocks) [ 735.043555][T17862] loop1: detected capacity change from 241 to 0 [ 735.083483][T17864] loop5: detected capacity change from 512 to 0 [ 735.094956][T17865] loop2: detected capacity change from 512 to 0 [ 735.103692][T17843] loop3: detected capacity change from 512 to 0 [ 735.104169][T17865] EXT4-fs (loop2): Test dummy encryption mode enabled [ 735.110910][T17863] loop4: detected capacity change from 512 to 0 [ 735.126733][T17862] EXT4-fs (loop1): Test dummy encryption mode enabled [ 735.130539][T17843] EXT4-fs (loop3): Test dummy encryption mode enabled [ 735.134093][T17865] EXT4-fs (loop2): bad geometry: block count 771752000 exceeds size of device (64 blocks) [ 735.140834][T17864] EXT4-fs (loop5): Test dummy encryption mode enabled [ 735.160379][T17862] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (30 blocks) [ 735.166500][T17863] EXT4-fs (loop4): Test dummy encryption mode enabled [ 735.177010][T17863] EXT4-fs (loop4): inodes count not valid: 3875536928 vs 32 [ 735.186118][T17843] EXT4-fs (loop3): inodes count not valid: 10682400 vs 32 10:58:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040006c0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 735.191494][T17864] EXT4-fs (loop5): inodes count not valid: 720928 vs 32 10:58:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000e84000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a4004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1dc80, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000004803000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 735.410628][T17885] loop0: detected capacity change from 512 to 0 [ 735.454652][T17885] EXT4-fs (loop0): Test dummy encryption mode enabled [ 735.465326][T17885] EXT4-fs (loop0): bad geometry: block count 7077952 exceeds size of device (64 blocks) [ 735.484788][T17889] loop4: detected capacity change from 512 to 0 [ 735.512161][T17896] loop2: detected capacity change from 512 to 0 [ 735.525878][T17895] loop3: detected capacity change from 512 to 0 [ 735.533266][T17889] EXT4-fs (loop4): Test dummy encryption mode enabled [ 735.540381][T17889] EXT4-fs (loop4): inodes count not valid: 3892314144 vs 32 [ 735.554499][T17901] loop1: detected capacity change from 238 to 0 10:58:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000740003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 735.562055][T17896] EXT4-fs (loop2): Test dummy encryption mode enabled [ 735.570836][T17895] EXT4-fs (loop3): Test dummy encryption mode enabled [ 735.583497][T17901] EXT4-fs (loop1): Test dummy encryption mode enabled [ 735.593792][T17896] EXT4-fs (loop2): bad geometry: block count 1207959616 exceeds size of device (64 blocks) [ 735.608893][T17901] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (29 blocks) [ 735.623034][T17895] EXT4-fs (loop3): inodes count not valid: 10747936 vs 32 [ 735.673343][T17912] loop5: detected capacity change from 512 to 0 [ 735.685068][T17889] loop4: detected capacity change from 512 to 0 10:58:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000004c03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 735.742563][T17915] loop0: detected capacity change from 512 to 0 [ 735.749663][T17912] EXT4-fs (loop5): Test dummy encryption mode enabled [ 735.758715][T17912] EXT4-fs (loop5): inodes count not valid: 786464 vs 32 [ 735.788495][T17889] EXT4-fs (loop4): Test dummy encryption mode enabled [ 735.802996][T17915] EXT4-fs (loop0): Test dummy encryption mode enabled [ 735.823211][T17895] loop3: detected capacity change from 512 to 0 [ 735.829603][T17889] EXT4-fs (loop4): inodes count not valid: 3892314144 vs 32 [ 735.840697][T17895] EXT4-fs (loop3): Test dummy encryption mode enabled [ 735.853572][T17915] EXT4-fs (loop0): bad geometry: block count 7602240 exceeds size of device (64 blocks) 10:58:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1dd8e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 735.884375][T17895] EXT4-fs (loop3): inodes count not valid: 10747936 vs 32 [ 735.915431][T17912] loop5: detected capacity change from 512 to 0 [ 735.962994][T17929] loop2: detected capacity change from 512 to 0 10:58:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000e94000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200015014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000790003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 736.009602][T17912] EXT4-fs (loop5): Test dummy encryption mode enabled [ 736.027759][T17912] EXT4-fs (loop5): inodes count not valid: 786464 vs 32 [ 736.113821][T17929] EXT4-fs (loop2): Test dummy encryption mode enabled [ 736.120811][T17929] EXT4-fs (loop2): bad geometry: block count 1275068480 exceeds size of device (64 blocks) 10:58:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000d004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 736.215419][T17939] loop1: detected capacity change from 238 to 0 [ 736.259505][T17945] loop0: detected capacity change from 512 to 0 [ 736.272928][T17945] EXT4-fs (loop0): Test dummy encryption mode enabled [ 736.280226][T17949] loop4: detected capacity change from 512 to 0 [ 736.280354][T17945] EXT4-fs (loop0): bad geometry: block count 7929920 exceeds size of device (64 blocks) 10:58:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000005c03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 736.365230][T17957] loop3: detected capacity change from 512 to 0 [ 736.371774][T17939] EXT4-fs (loop1): Test dummy encryption mode enabled [ 736.379316][T17949] EXT4-fs (loop4): Test dummy encryption mode enabled [ 736.399861][T17939] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (29 blocks) 10:58:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040007a0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 736.421698][T17949] EXT4-fs (loop4): inodes count not valid: 3909091360 vs 32 [ 736.422281][T17957] EXT4-fs (loop3): Test dummy encryption mode enabled [ 736.431797][T17963] loop5: detected capacity change from 512 to 0 [ 736.445691][T17957] EXT4-fs (loop3): inodes count not valid: 18153504 vs 32 [ 736.553062][T17963] EXT4-fs (loop5): Test dummy encryption mode enabled [ 736.560029][T17963] EXT4-fs (loop5): inodes count not valid: 852000 vs 32 10:58:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000e004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 736.633853][T17971] loop2: detected capacity change from 512 to 0 [ 736.644546][T17949] loop4: detected capacity change from 512 to 0 [ 736.667043][T17957] loop3: detected capacity change from 512 to 0 10:58:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1dd40, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 736.684407][T17971] EXT4-fs (loop2): Test dummy encryption mode enabled [ 736.697200][T17949] EXT4-fs (loop4): Test dummy encryption mode enabled [ 736.704839][T17957] EXT4-fs (loop3): Test dummy encryption mode enabled [ 736.722005][T17971] EXT4-fs (loop2): bad geometry: block count 1543503936 exceeds size of device (64 blocks) [ 736.733581][T17957] EXT4-fs (loop3): inodes count not valid: 18153504 vs 32 [ 736.742263][T17949] EXT4-fs (loop4): inodes count not valid: 3909091360 vs 32 10:58:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20001e014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000006003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200001e94000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 736.813632][T17979] loop0: detected capacity change from 512 to 0 [ 736.845518][T17986] loop5: detected capacity change from 512 to 0 [ 736.882349][T17987] loop1: detected capacity change from 238 to 0 [ 736.940847][T17986] EXT4-fs (loop5): Test dummy encryption mode enabled [ 736.943311][T17979] EXT4-fs (loop0): Test dummy encryption mode enabled [ 736.956153][T18000] loop2: detected capacity change from 512 to 0 [ 736.959622][T17986] EXT4-fs (loop5): inodes count not valid: 917536 vs 32 [ 736.976338][T17979] EXT4-fs (loop0): bad geometry: block count 7995456 exceeds size of device (64 blocks) [ 736.993984][T17987] EXT4-fs (loop1): Test dummy encryption mode enabled [ 737.004639][T18000] EXT4-fs (loop2): Test dummy encryption mode enabled [ 737.013487][T17987] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (29 blocks) [ 737.023111][T18000] EXT4-fs (loop2): bad geometry: block count 1610612800 exceeds size of device (64 blocks) [ 737.072500][T18004] loop4: detected capacity change from 512 to 0 10:58:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000f004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200015014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 737.243841][T18004] EXT4-fs (loop4): Test dummy encryption mode enabled [ 737.251951][T18004] EXT4-fs (loop4): inodes count not valid: 3909156896 vs 32 [ 737.259396][T17993] loop3: detected capacity change from 512 to 0 10:58:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000006803000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040017a0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 737.317012][T17993] EXT4-fs (loop3): Test dummy encryption mode enabled [ 737.334127][T18019] loop1: detected capacity change from 512 to 0 10:58:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20003c014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 737.372808][T17993] EXT4-fs (loop3): inodes count not valid: 18743328 vs 32 [ 737.394052][T18021] loop5: detected capacity change from 512 to 0 [ 737.411663][T18019] EXT4-fs (loop1): Test dummy encryption mode enabled 10:58:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200041014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 737.456285][T18004] loop4: detected capacity change from 512 to 0 [ 737.463930][T18027] loop0: detected capacity change from 512 to 0 [ 737.481896][T18019] EXT4-fs (loop1): inodes count not valid: 18153504 vs 32 [ 737.491076][T18026] loop2: detected capacity change from 512 to 0 [ 737.505834][T18027] EXT4-fs (loop0): Test dummy encryption mode enabled [ 737.513180][T18004] EXT4-fs (loop4): Test dummy encryption mode enabled [ 737.520192][T18021] EXT4-fs (loop5): Test dummy encryption mode enabled [ 737.536108][T18004] EXT4-fs (loop4): inodes count not valid: 3909156896 vs 32 [ 737.544695][T18027] EXT4-fs (loop0): bad geometry: block count 7995712 exceeds size of device (64 blocks) 10:58:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200067014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040007d0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 737.560946][T18021] EXT4-fs (loop5): inodes count not valid: 983072 vs 32 [ 737.571585][T18026] EXT4-fs (loop2): Test dummy encryption mode enabled [ 737.595235][T18026] EXT4-fs (loop2): bad geometry: block count 1744830528 exceeds size of device (64 blocks) 10:58:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200002ec4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1d280, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000006c03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 737.760858][T18051] loop0: detected capacity change from 512 to 0 [ 737.777854][T18051] EXT4-fs (loop0): Test dummy encryption mode enabled [ 737.795162][T18051] EXT4-fs (loop0): bad geometry: block count 8192064 exceeds size of device (64 blocks) [ 737.812804][T18049] loop3: detected capacity change from 512 to 0 [ 737.829822][T18021] loop5: detected capacity change from 512 to 0 [ 737.874456][T18021] EXT4-fs (loop5): Test dummy encryption mode enabled [ 737.886073][T18049] EXT4-fs (loop3): Test dummy encryption mode enabled [ 737.896635][T18021] EXT4-fs (loop5): inodes count not valid: 983072 vs 32 [ 737.900653][T18049] EXT4-fs (loop3): inodes count not valid: 23527456 vs 32 [ 737.911518][T18063] loop1: detected capacity change from 233 to 0 [ 737.953072][T18066] loop2: detected capacity change from 512 to 0 [ 737.977789][T18063] EXT4-fs (loop1): Test dummy encryption mode enabled [ 737.992824][T18058] loop4: detected capacity change from 512 to 0 [ 737.999912][T18063] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (29 blocks) [ 738.041786][T18066] EXT4-fs (loop2): Test dummy encryption mode enabled 10:58:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200010004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a0014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040007e0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 738.048852][T18058] EXT4-fs (loop4): Test dummy encryption mode enabled [ 738.064211][T18066] EXT4-fs (loop2): bad geometry: block count 1811939392 exceeds size of device (64 blocks) [ 738.079931][T18058] EXT4-fs (loop4): inodes count not valid: 3959554080 vs 32 10:58:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200003f04000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 738.265712][T18080] loop5: detected capacity change from 512 to 0 [ 738.277200][T18083] loop0: detected capacity change from 512 to 0 10:58:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000007403000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200067014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 738.350561][T18083] EXT4-fs (loop0): Test dummy encryption mode enabled [ 738.361940][T18080] EXT4-fs (loop5): Test dummy encryption mode enabled [ 738.383437][T18083] EXT4-fs (loop0): bad geometry: block count 8257600 exceeds size of device (64 blocks) [ 738.394965][T18080] EXT4-fs (loop5): inodes count not valid: 1048608 vs 32 [ 738.405586][T18093] loop3: detected capacity change from 512 to 0 10:58:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200011004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040007f0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 738.523800][T18104] loop4: detected capacity change from 512 to 0 [ 738.523977][T18093] EXT4-fs (loop3): Test dummy encryption mode enabled [ 738.538019][T18098] loop1: detected capacity change from 512 to 0 [ 738.556808][T18093] EXT4-fs (loop3): inodes count not valid: 27263008 vs 32 [ 738.557046][T18104] EXT4-fs (loop4): Test dummy encryption mode enabled [ 738.570997][T18103] loop2: detected capacity change from 512 to 0 [ 738.591375][T18098] EXT4-fs (loop1): Test dummy encryption mode enabled [ 738.602684][T18104] EXT4-fs (loop4): inodes count not valid: 4026728480 vs 32 [ 738.612976][T18098] EXT4-fs (loop1): inodes count not valid: 23527456 vs 32 10:58:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1d680, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000f64000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 738.648647][T18114] loop5: detected capacity change from 512 to 0 [ 738.665668][T18103] EXT4-fs (loop2): Test dummy encryption mode enabled [ 738.680788][T18103] EXT4-fs (loop2): bad geometry: block count 1946157120 exceeds size of device (64 blocks) [ 738.702940][T18117] loop0: detected capacity change from 512 to 0 [ 738.711591][T18114] EXT4-fs (loop5): Test dummy encryption mode enabled [ 738.730296][T18114] EXT4-fs (loop5): inodes count not valid: 1114144 vs 32 [ 738.736174][T18093] loop3: detected capacity change from 512 to 0 [ 738.813834][T18117] EXT4-fs (loop0): Test dummy encryption mode enabled [ 738.822106][T18117] EXT4-fs (loop0): bad geometry: block count 8323136 exceeds size of device (64 blocks) [ 738.872876][T18129] loop4: detected capacity change from 512 to 0 [ 738.873202][T18093] EXT4-fs (loop3): Test dummy encryption mode enabled [ 738.894612][T18093] EXT4-fs (loop3): inodes count not valid: 27263008 vs 32 [ 738.898122][T18130] loop1: detected capacity change from 235 to 0 [ 738.913275][T18130] EXT4-fs (loop1): Test dummy encryption mode enabled 10:58:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000007903000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000890003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 738.929335][T18130] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (29 blocks) [ 738.944681][T18129] EXT4-fs (loop4): Test dummy encryption mode enabled [ 738.952041][T18114] loop5: detected capacity change from 512 to 0 10:58:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a2014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 738.996785][T18114] EXT4-fs (loop5): Test dummy encryption mode enabled [ 739.005689][T18129] EXT4-fs (loop4): inodes count not valid: 4127195168 vs 32 10:58:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040018e0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1d640, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 739.061539][T18114] EXT4-fs (loop5): inodes count not valid: 1114144 vs 32 10:58:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200012004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 739.221717][T18146] loop2: detected capacity change from 512 to 0 [ 739.296118][T18151] loop3: detected capacity change from 512 to 0 [ 739.304635][T18151] EXT4-fs (loop3): Test dummy encryption mode enabled [ 739.316430][T18151] EXT4-fs (loop3): inodes count not valid: 27394080 vs 32 [ 739.325560][T18157] loop1: detected capacity change from 235 to 0 [ 739.337648][T18129] loop4: detected capacity change from 512 to 0 [ 739.384802][T18163] loop0: detected capacity change from 512 to 0 [ 739.392899][T18157] EXT4-fs (loop1): Test dummy encryption mode enabled [ 739.408983][T18163] EXT4-fs (loop0): Test dummy encryption mode enabled [ 739.410694][T18146] EXT4-fs (loop2): Test dummy encryption mode enabled [ 739.423359][T18129] EXT4-fs (loop4): Test dummy encryption mode enabled [ 739.426630][T18157] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (29 blocks) [ 739.442213][T18129] EXT4-fs (loop4): inodes count not valid: 4127195168 vs 32 [ 739.451505][T18146] EXT4-fs (loop2): bad geometry: block count 2030043200 exceeds size of device (64 blocks) [ 739.451532][T18163] EXT4-fs (loop0): bad geometry: block count 9306432 exceeds size of device (64 blocks) [ 739.474493][T18151] loop3: detected capacity change from 512 to 0 10:58:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200001f84000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200018004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 739.701674][T18151] EXT4-fs (loop3): Test dummy encryption mode enabled 10:58:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000007a03000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000b3014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004015a90003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1d440, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 739.745832][T18151] EXT4-fs (loop3): inodes count not valid: 27394080 vs 32 [ 739.842025][T18183] loop5: detected capacity change from 512 to 0 [ 739.886614][T18181] loop4: detected capacity change from 512 to 0 [ 739.907134][T18184] loop2: detected capacity change from 512 to 0 [ 739.940530][T18192] loop1: detected capacity change from 234 to 0 [ 739.949597][T18183] EXT4-fs (loop5): Test dummy encryption mode enabled [ 739.974199][T18191] loop0: detected capacity change from 512 to 0 [ 739.981481][T18183] EXT4-fs (loop5): inodes count not valid: 1572896 vs 32 [ 739.997479][T18181] EXT4-fs (loop4): Test dummy encryption mode enabled [ 740.004726][T18192] EXT4-fs (loop1): Test dummy encryption mode enabled [ 740.013598][T18184] EXT4-fs (loop2): Test dummy encryption mode enabled [ 740.038007][T18192] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (29 blocks) [ 740.048081][T18181] EXT4-fs (loop4): inodes count not valid: 4160815136 vs 32 [ 740.057301][T18184] EXT4-fs (loop2): bad geometry: block count 2046820416 exceeds size of device (64 blocks) [ 740.067569][T18203] loop3: detected capacity change from 512 to 0 10:58:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1cf40, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 740.159608][T18191] EXT4-fs (loop0): Test dummy encryption mode enabled [ 740.162968][T18203] EXT4-fs (loop3): Test dummy encryption mode enabled [ 740.174684][T18203] EXT4-fs (loop3): inodes count not valid: 28508192 vs 32 [ 740.193436][T18191] EXT4-fs (loop0): bad geometry: block count 11081024 exceeds size of device (64 blocks) [ 740.216711][T18183] loop5: detected capacity change from 512 to 0 10:58:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200021004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000008903000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200003f84000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004015ac0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 740.414133][T18216] loop1: detected capacity change from 231 to 0 [ 740.425102][T18203] loop3: detected capacity change from 512 to 0 [ 740.465169][T18216] EXT4-fs (loop1): Test dummy encryption mode enabled [ 740.472267][T18203] EXT4-fs (loop3): Test dummy encryption mode enabled [ 740.479309][T18226] loop2: detected capacity change from 512 to 0 [ 740.486392][T18203] EXT4-fs (loop3): inodes count not valid: 28508192 vs 32 [ 740.491815][T18216] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (28 blocks) [ 740.520490][T18228] loop4: detected capacity change from 512 to 0 10:58:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000e9014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 740.570349][T18226] EXT4-fs (loop2): Test dummy encryption mode enabled [ 740.572994][T18236] loop5: detected capacity change from 512 to 0 [ 740.577413][T18226] EXT4-fs (loop2): bad geometry: block count 2298478656 exceeds size of device (64 blocks) [ 740.600432][T18228] EXT4-fs (loop4): Test dummy encryption mode enabled [ 740.609619][T18238] loop0: detected capacity change from 512 to 0 [ 740.616277][T18228] EXT4-fs (loop4): inodes count not valid: 4160946208 vs 32 10:58:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1cd00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 740.669016][T18236] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000005000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 740.722866][T18236] EXT4-fs (loop5): inodes count not valid: 2162720 vs 32 [ 740.752114][T18228] loop4: detected capacity change from 512 to 0 [ 740.758916][T18238] EXT4-fs (loop0): Test dummy encryption mode enabled [ 740.773320][T18238] EXT4-fs (loop0): bad geometry: block count 11277632 exceeds size of device (64 blocks) [ 740.842931][T18228] EXT4-fs (loop4): Test dummy encryption mode enabled [ 740.859171][T18228] EXT4-fs (loop4): inodes count not valid: 4160946208 vs 32 [ 740.882872][T18255] loop1: detected capacity change from 230 to 0 [ 740.894903][T18254] loop2: detected capacity change from 512 to 0 10:58:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200025004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 740.942817][T18246] loop3: detected capacity change from 512 to 0 [ 740.953544][T18255] EXT4-fs (loop1): Test dummy encryption mode enabled [ 740.954032][T18254] EXT4-fs (loop2): Test dummy encryption mode enabled 10:58:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000fff4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004002e00003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 740.992765][T18255] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (28 blocks) [ 741.013782][T18254] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 741.017061][T18246] EXT4-fs (loop3): Test dummy encryption mode enabled [ 741.029547][T18254] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 741.049483][T18246] EXT4-fs (loop3): inodes count not valid: 32047136 vs 32 [ 741.071663][T18254] EXT4-fs (loop2): get root inode failed [ 741.079296][T18254] EXT4-fs (loop2): mount failed [ 741.182004][T18272] loop5: detected capacity change from 512 to 0 [ 741.188803][T18270] loop0: detected capacity change from 512 to 0 10:58:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c980, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 741.241913][T18271] loop4: detected capacity change from 512 to 0 [ 741.268658][T18271] EXT4-fs (loop4): Test dummy encryption mode enabled [ 741.271380][T18272] EXT4-fs (loop5): Test dummy encryption mode enabled [ 741.287050][T18270] EXT4-fs (loop0): Test dummy encryption mode enabled [ 741.300574][T18270] EXT4-fs (loop0): bad geometry: block count 14680640 exceeds size of device (64 blocks) [ 741.310614][T18246] loop3: detected capacity change from 512 to 0 [ 741.318769][T18271] EXT4-fs (loop4): inodes count not valid: 4279173152 vs 32 [ 741.318865][T18272] EXT4-fs (loop5): inodes count not valid: 2424864 vs 32 10:58:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000006000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 741.336518][T18246] EXT4-fs (loop3): Test dummy encryption mode enabled [ 741.352146][T18246] EXT4-fs (loop3): inodes count not valid: 32047136 vs 32 10:58:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000ffff8000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f8014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 741.523733][T18288] loop1: detected capacity change from 228 to 0 [ 741.535823][T18293] loop2: detected capacity change from 512 to 0 [ 741.554877][T18272] loop5: detected capacity change from 512 to 0 10:58:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004003f00003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 741.575505][T18288] EXT4-fs (loop1): Test dummy encryption mode enabled [ 741.587099][T18288] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (28 blocks) [ 741.620561][T18272] EXT4-fs (loop5): Test dummy encryption mode enabled [ 741.620594][T18293] EXT4-fs (loop2): Test dummy encryption mode enabled [ 741.627526][T18304] loop4: detected capacity change from 512 to 0 [ 741.650416][T18293] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 741.664373][T18272] EXT4-fs (loop5): inodes count not valid: 2424864 vs 32 [ 741.670838][T18293] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 741.686380][T18293] EXT4-fs (loop2): get root inode failed [ 741.700606][T18304] EXT4-fs (loop4): Test dummy encryption mode enabled 10:58:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000007000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c840, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 741.716642][T18304] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (64 blocks) [ 741.727294][T18293] EXT4-fs (loop2): mount failed 10:58:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20002e004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 741.777404][T18314] loop0: detected capacity change from 512 to 0 [ 741.794351][T18313] loop3: detected capacity change from 512 to 0 [ 741.822263][T18314] EXT4-fs (loop0): Test dummy encryption mode enabled [ 741.829334][T18314] EXT4-fs (loop0): bad geometry: block count 15729472 exceeds size of device (64 blocks) [ 741.979355][T18321] loop2: detected capacity change from 512 to 0 [ 742.023312][T18313] EXT4-fs (loop3): Test dummy encryption mode enabled [ 742.023381][T18321] EXT4-fs (loop2): Test dummy encryption mode enabled [ 742.030318][T18313] EXT4-fs (loop3): inodes count not valid: 33030176 vs 32 [ 742.045503][T18321] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 742.062080][T18304] loop4: detected capacity change from 512 to 0 10:58:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004001f80003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 742.069387][T18328] loop1: detected capacity change from 228 to 0 [ 742.078381][T18321] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 742.094382][T18321] EXT4-fs (loop2): get root inode failed [ 742.100055][T18321] EXT4-fs (loop2): mount failed [ 742.152385][T18304] EXT4-fs (loop4): Test dummy encryption mode enabled [ 742.160650][T18336] loop5: detected capacity change from 512 to 0 [ 742.168558][T18304] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (64 blocks) [ 742.181710][T18328] EXT4-fs (loop1): Test dummy encryption mode enabled [ 742.218767][T18328] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (28 blocks) [ 742.231353][T18313] loop3: detected capacity change from 512 to 0 [ 742.242241][T18313] EXT4-fs (loop3): Test dummy encryption mode enabled [ 742.250311][T18336] EXT4-fs (loop5): Test dummy encryption mode enabled 10:58:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000ffffa000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000009000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 742.282500][T18347] loop0: detected capacity change from 512 to 0 [ 742.282501][T18336] EXT4-fs (loop5): inodes count not valid: 3014688 vs 32 [ 742.313049][T18313] EXT4-fs (loop3): inodes count not valid: 33030176 vs 32 10:58:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 742.431632][T18347] EXT4-fs (loop0): Test dummy encryption mode enabled [ 742.442426][T18353] loop4: detected capacity change from 512 to 0 [ 742.450670][T18347] EXT4-fs (loop0): bad geometry: block count 16253248 exceeds size of device (64 blocks) [ 742.492492][T18336] loop5: detected capacity change from 512 to 0 [ 742.499725][T18353] EXT4-fs (loop4): Test dummy encryption mode enabled [ 742.514160][T18353] EXT4-fs (loop4): bad geometry: block count 160 exceeds size of device (64 blocks) 10:58:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c8c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 742.552406][T18359] loop2: detected capacity change from 512 to 0 [ 742.562511][T18336] EXT4-fs (loop5): Test dummy encryption mode enabled [ 742.571203][T18336] EXT4-fs (loop5): inodes count not valid: 3014688 vs 32 [ 742.623895][T18359] EXT4-fs (loop2): Test dummy encryption mode enabled [ 742.634412][T18359] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 742.650773][T18359] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated 10:58:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400fff0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 742.673488][T18353] loop4: detected capacity change from 512 to 0 [ 742.686321][T18359] EXT4-fs (loop2): get root inode failed [ 742.697619][T18359] EXT4-fs (loop2): mount failed 10:58:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200032004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 742.729155][T18368] loop3: detected capacity change from 512 to 0 [ 742.743359][T18353] EXT4-fs (loop4): Test dummy encryption mode enabled [ 742.753867][T18368] EXT4-fs (loop3): Test dummy encryption mode enabled [ 742.764550][T18353] EXT4-fs (loop4): bad geometry: block count 160 exceeds size of device (64 blocks) 10:58:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000a000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 742.774177][T18368] EXT4-fs (loop3): inodes count not valid: 33816608 vs 32 10:58:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000020000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 742.941428][T18383] loop1: detected capacity change from 228 to 0 [ 742.950059][T18381] loop0: detected capacity change from 512 to 0 [ 742.998267][T18385] loop2: detected capacity change from 512 to 0 [ 743.011897][T18383] EXT4-fs (loop1): Test dummy encryption mode enabled [ 743.020857][T18381] EXT4-fs (loop0): Test dummy encryption mode enabled [ 743.030803][T18381] EXT4-fs (loop0): bad geometry: block count 16715584 exceeds size of device (64 blocks) [ 743.040771][T18368] loop3: detected capacity change from 512 to 0 [ 743.049356][T18368] EXT4-fs (loop3): Test dummy encryption mode enabled [ 743.052024][T18385] EXT4-fs (loop2): Test dummy encryption mode enabled [ 743.066309][T18383] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (28 blocks) [ 743.078967][T18368] EXT4-fs (loop3): inodes count not valid: 33816608 vs 32 [ 743.079279][T18394] loop5: detected capacity change from 512 to 0 [ 743.093117][T18385] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 743.114751][T18385] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 743.127228][T18385] EXT4-fs (loop2): get root inode failed [ 743.134572][T18385] EXT4-fs (loop2): mount failed 10:58:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000004000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 743.152614][T18394] EXT4-fs (loop5): Test dummy encryption mode enabled [ 743.161746][T18394] EXT4-fs (loop5): inodes count not valid: 3276832 vs 32 10:58:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20005d024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000b000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 743.363251][T18403] loop4: detected capacity change from 512 to 0 10:58:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c8c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 743.411721][T18394] loop5: detected capacity change from 512 to 0 [ 743.418903][T18403] EXT4-fs (loop4): Test dummy encryption mode enabled [ 743.419009][T18394] EXT4-fs (loop5): Test dummy encryption mode enabled [ 743.432771][T18394] EXT4-fs (loop5): inodes count not valid: 3276832 vs 32 [ 743.456353][T18403] EXT4-fs (loop4): bad geometry: first data block 0 is beyond end of filesystem (0) [ 743.541968][T18417] loop0: detected capacity change from 512 to 0 [ 743.556022][T18423] loop2: detected capacity change from 512 to 0 [ 743.583681][T18421] loop3: detected capacity change from 512 to 0 [ 743.590797][T18423] EXT4-fs (loop2): Test dummy encryption mode enabled [ 743.605113][T18430] loop1: detected capacity change from 228 to 0 [ 743.614564][T18423] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended 10:58:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200048004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 743.615576][T18403] loop4: detected capacity change from 512 to 0 [ 743.639728][T18417] EXT4-fs (loop0): Test dummy encryption mode enabled [ 743.639914][T18421] EXT4-fs (loop3): Test dummy encryption mode enabled [ 743.654346][T18430] EXT4-fs (loop1): Test dummy encryption mode enabled [ 743.656435][T18403] EXT4-fs (loop4): Test dummy encryption mode enabled [ 743.669329][T18430] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (28 blocks) [ 743.678959][T18403] EXT4-fs (loop4): bad geometry: first data block 0 is beyond end of filesystem (0) [ 743.693287][T18421] EXT4-fs (loop3): inodes count not valid: 39649312 vs 32 [ 743.701829][T18423] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 743.719988][T18417] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:58:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000040000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 743.731505][T18423] EXT4-fs (loop2): get root inode failed [ 743.738485][T18423] EXT4-fs (loop2): mount failed 10:58:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20005f024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000005000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 743.804344][T18442] loop5: detected capacity change from 512 to 0 10:58:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000c000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c8c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 743.880196][T18442] EXT4-fs (loop5): Test dummy encryption mode enabled [ 743.887576][T18442] EXT4-fs (loop5): inodes count not valid: 4718624 vs 32 [ 744.006678][T18456] loop3: detected capacity change from 512 to 0 [ 744.061979][T18456] EXT4-fs (loop3): Test dummy encryption mode enabled [ 744.074099][T18456] EXT4-fs (loop3): inodes count not valid: 39780384 vs 32 [ 744.081472][T18455] loop0: detected capacity change from 512 to 0 [ 744.089785][T18451] loop4: detected capacity change from 512 to 0 [ 744.101610][T18465] loop1: detected capacity change from 228 to 0 [ 744.108573][T18464] loop2: detected capacity change from 512 to 0 [ 744.131834][T18465] EXT4-fs (loop1): Test dummy encryption mode enabled [ 744.143177][T18455] EXT4-fs (loop0): Test dummy encryption mode enabled [ 744.143348][T18451] EXT4-fs (loop4): Test dummy encryption mode enabled [ 744.157155][T18451] EXT4-fs (loop4): bad geometry: first data block 0 is beyond end of filesystem (0) [ 744.171823][T18464] EXT4-fs (loop2): Test dummy encryption mode enabled 10:58:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000500000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20009d024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20004c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 744.201612][T18455] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 744.215696][T18465] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (28 blocks) [ 744.254837][T18464] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 744.286412][T18464] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 744.298911][T18464] EXT4-fs (loop2): get root inode failed [ 744.304977][T18464] EXT4-fs (loop2): mount failed 10:58:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000006000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 744.421159][T18482] loop4: detected capacity change from 512 to 0 [ 744.427984][T18488] loop5: detected capacity change from 512 to 0 [ 744.472592][T18489] loop3: detected capacity change from 512 to 0 [ 744.479758][T18482] EXT4-fs (loop4): Test dummy encryption mode enabled [ 744.486913][T18488] EXT4-fs (loop5): Test dummy encryption mode enabled [ 744.507490][T18482] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 4)! 10:58:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000d000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c2e0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 744.519315][T18489] EXT4-fs (loop3): Test dummy encryption mode enabled [ 744.526319][T18488] EXT4-fs (loop5): inodes count not valid: 4980768 vs 32 [ 744.554737][T18489] EXT4-fs (loop3): inodes count not valid: 43843616 vs 32 [ 744.559359][T18482] EXT4-fs (loop4): group descriptors corrupted! [ 744.586064][T18504] loop1: detected capacity change from 225 to 0 [ 744.600209][T18502] loop0: detected capacity change from 512 to 0 [ 744.613175][T18488] loop5: detected capacity change from 512 to 0 [ 744.701755][T18504] EXT4-fs (loop1): Test dummy encryption mode enabled [ 744.709005][T18508] loop2: detected capacity change from 512 to 0 [ 744.730539][T18504] EXT4-fs (loop1): bad geometry: block count 64 exceeds size of device (28 blocks) [ 744.741152][T18502] EXT4-fs (loop0): Test dummy encryption mode enabled [ 744.751830][T18488] EXT4-fs (loop5): Test dummy encryption mode enabled [ 744.759290][T18488] EXT4-fs (loop5): inodes count not valid: 4980768 vs 32 [ 744.760118][T18502] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 744.787488][T18489] loop3: detected capacity change from 512 to 0 10:58:56 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 744.811219][T18508] EXT4-fs (loop2): Test dummy encryption mode enabled [ 744.818597][T18508] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended 10:58:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000007000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20005c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 744.861495][T18489] EXT4-fs (loop3): Test dummy encryption mode enabled [ 744.864894][T18482] loop4: detected capacity change from 512 to 0 [ 744.876277][T18489] EXT4-fs (loop3): inodes count not valid: 43843616 vs 32 [ 744.884530][T18508] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 744.897718][T18508] EXT4-fs (loop2): get root inode failed [ 744.915629][T18508] EXT4-fs (loop2): mount failed [ 744.947376][T18530] FAULT_INJECTION: forcing a failure. [ 744.947376][T18530] name failslab, interval 1, probability 0, space 0, times 0 [ 744.960122][T18530] CPU: 0 PID: 18530 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 744.969033][T18530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.979341][T18530] Call Trace: [ 744.982721][T18530] dump_stack+0x116/0x15d [ 744.987037][T18530] should_fail+0x231/0x240 [ 744.991502][T18530] __should_failslab+0x81/0x90 [ 744.996283][T18530] ? __se_sys_memfd_create+0xfb/0x370 [ 745.001637][T18530] should_failslab+0x5/0x20 [ 745.006138][T18530] __kmalloc+0x59/0x360 [ 745.010290][T18530] ? strnlen_user+0x137/0x1c0 [ 745.014987][T18530] __se_sys_memfd_create+0xfb/0x370 [ 745.020220][T18530] __x64_sys_memfd_create+0x2d/0x40 [ 745.025403][T18530] do_syscall_64+0x39/0x80 [ 745.029879][T18530] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 745.035823][T18530] RIP: 0033:0x45e219 [ 745.039708][T18530] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 745.059295][T18530] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 745.067757][T18530] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 745.075745][T18530] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 745.083716][T18530] RBP: 0000000008100000 R08: 0000000020000248 R09: 0000000000000000 10:58:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000e000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:56 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 745.091720][T18530] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 745.099674][T18530] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 10:58:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000600000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a1024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 745.253261][T18541] FAULT_INJECTION: forcing a failure. [ 745.253261][T18541] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 745.266462][T18541] CPU: 1 PID: 18541 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 745.272732][T18537] loop5: detected capacity change from 512 to 0 [ 745.275477][T18541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.275490][T18541] Call Trace: [ 745.275497][T18541] dump_stack+0x116/0x15d [ 745.284610][T18538] loop0: detected capacity change from 512 to 0 [ 745.292032][T18541] should_fail+0x231/0x240 [ 745.292057][T18541] should_fail_usercopy+0x16/0x20 [ 745.317322][T18541] _copy_from_user+0x1c/0xd0 [ 745.323144][T18541] __se_sys_memfd_create+0x137/0x370 [ 745.328867][T18541] __x64_sys_memfd_create+0x2d/0x40 [ 745.334540][T18541] do_syscall_64+0x39/0x80 [ 745.340125][T18541] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 745.347357][T18541] RIP: 0033:0x45e219 [ 745.352523][T18541] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 745.372253][T18541] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 745.380793][T18541] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 745.388889][T18541] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2c87 10:58:57 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 745.396914][T18541] RBP: 0000000008100000 R08: 0000000020000248 R09: 0000000000000000 [ 745.404866][T18541] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 745.412828][T18541] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 745.451605][T18542] loop2: detected capacity change from 512 to 0 [ 745.465311][T18537] EXT4-fs (loop5): Test dummy encryption mode enabled [ 745.473243][T18538] EXT4-fs (loop0): Test dummy encryption mode enabled [ 745.491129][T18542] EXT4-fs (loop2): Test dummy encryption mode enabled [ 745.503206][T18537] EXT4-fs (loop5): inodes count not valid: 6029344 vs 32 [ 745.518394][T18542] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 745.523401][T18556] FAULT_INJECTION: forcing a failure. [ 745.523401][T18556] name failslab, interval 1, probability 0, space 0, times 0 [ 745.536435][T18538] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 745.549170][T18556] CPU: 1 PID: 18556 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 745.560083][T18558] loop4: detected capacity change from 512 to 0 [ 745.567612][T18556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.567629][T18556] Call Trace: [ 745.567637][T18556] dump_stack+0x116/0x15d [ 745.567661][T18556] should_fail+0x231/0x240 [ 745.596674][T18556] ? shmem_alloc_inode+0x22/0x30 [ 745.598287][T18558] EXT4-fs (loop4): Test dummy encryption mode enabled [ 745.601622][T18556] __should_failslab+0x81/0x90 [ 745.601645][T18556] ? shmem_match+0xa0/0xa0 [ 745.619079][T18556] should_failslab+0x5/0x20 [ 745.624835][T18556] kmem_cache_alloc+0x36/0x2e0 [ 745.629642][T18556] ? fsnotify_perm+0x59/0x2d0 [ 745.634323][T18556] ? shmem_match+0xa0/0xa0 [ 745.638768][T18556] shmem_alloc_inode+0x22/0x30 [ 745.643669][T18556] new_inode_pseudo+0x38/0x1a0 [ 745.648495][T18556] new_inode+0x21/0x100 [ 745.652653][T18556] shmem_get_inode+0xa1/0x430 [ 745.657318][T18556] __shmem_file_setup+0xef/0x1c0 [ 745.662387][T18556] shmem_file_setup+0x37/0x40 [ 745.667072][T18556] __se_sys_memfd_create+0x1eb/0x370 [ 745.672423][T18556] __x64_sys_memfd_create+0x2d/0x40 [ 745.677603][T18556] do_syscall_64+0x39/0x80 [ 745.682071][T18556] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 745.687961][T18556] RIP: 0033:0x45e219 [ 745.691836][T18556] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 745.711426][T18556] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 745.719818][T18556] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 745.727768][T18556] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 745.735731][T18556] RBP: 0000000008100000 R08: 0000000020000248 R09: 0000000000000000 [ 745.743699][T18556] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 745.751652][T18556] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 745.763488][T18542] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 745.775610][T18555] loop3: detected capacity change from 512 to 0 [ 745.784916][T18542] EXT4-fs (loop2): get root inode failed [ 745.791853][T18542] EXT4-fs (loop2): mount failed 10:58:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000008000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:57 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 745.797533][T18558] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 4)! [ 745.816784][T18558] EXT4-fs (loop4): group descriptors corrupted! [ 745.827954][T18555] EXT4-fs (loop3): Test dummy encryption mode enabled [ 745.839889][T18555] EXT4-fs (loop3): inodes count not valid: 44105760 vs 32 10:58:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c3024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000700000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 745.908869][T18537] loop5: detected capacity change from 512 to 0 10:58:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000f000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 745.969920][T18572] FAULT_INJECTION: forcing a failure. [ 745.969920][T18572] name failslab, interval 1, probability 0, space 0, times 0 [ 746.014095][T18537] EXT4-fs (loop5): Test dummy encryption mode enabled [ 746.025965][T18574] loop0: detected capacity change from 512 to 0 [ 746.034649][T18572] CPU: 1 PID: 18572 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 746.043418][T18572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.053510][T18572] Call Trace: [ 746.056895][T18572] dump_stack+0x116/0x15d [ 746.061265][T18572] should_fail+0x231/0x240 [ 746.065689][T18572] ? security_inode_alloc+0x2e/0x170 [ 746.070209][T18537] EXT4-fs (loop5): inodes count not valid: 6029344 vs 32 [ 746.070980][T18572] __should_failslab+0x81/0x90 [ 746.071079][T18572] should_failslab+0x5/0x20 [ 746.089705][T18572] kmem_cache_alloc+0x36/0x2e0 [ 746.095386][T18572] security_inode_alloc+0x2e/0x170 [ 746.101201][T18572] inode_init_always+0x211/0x430 [ 746.107318][T18572] ? shmem_match+0xa0/0xa0 [ 746.113076][T18572] new_inode_pseudo+0x6f/0x1a0 [ 746.118662][T18572] new_inode+0x21/0x100 [ 746.124111][T18572] shmem_get_inode+0xa1/0x430 [ 746.129626][T18572] __shmem_file_setup+0xef/0x1c0 [ 746.135056][T18572] shmem_file_setup+0x37/0x40 [ 746.140634][T18572] __se_sys_memfd_create+0x1eb/0x370 [ 746.146316][T18572] __x64_sys_memfd_create+0x2d/0x40 [ 746.151816][T18572] do_syscall_64+0x39/0x80 [ 746.157457][T18572] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 746.163470][T18572] RIP: 0033:0x45e219 [ 746.167341][T18572] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 746.186993][T18572] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 746.195437][T18572] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 746.203458][T18572] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 746.211445][T18572] RBP: 0000000008100000 R08: 0000000020000248 R09: 0000000000000000 [ 746.219393][T18572] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 746.227346][T18572] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 746.266672][T18582] loop4: detected capacity change from 512 to 0 [ 746.292794][T18582] EXT4-fs (loop4): Test dummy encryption mode enabled [ 746.292832][T18574] EXT4-fs (loop0): Test dummy encryption mode enabled [ 746.306767][T18582] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 4)! 10:58:58 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:58:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200060004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 746.316778][T18582] EXT4-fs (loop4): group descriptors corrupted! [ 746.370106][T18574] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 746.391857][T18582] loop4: detected capacity change from 512 to 0 [ 746.412763][T18587] loop3: detected capacity change from 512 to 0 10:58:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000009000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 746.426667][T18588] loop2: detected capacity change from 512 to 0 [ 746.438770][T18600] FAULT_INJECTION: forcing a failure. [ 746.438770][T18600] name failslab, interval 1, probability 0, space 0, times 0 [ 746.453801][T18600] CPU: 1 PID: 18600 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 746.462686][T18600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.472729][T18600] Call Trace: [ 746.475998][T18600] dump_stack+0x116/0x15d [ 746.480385][T18600] should_fail+0x231/0x240 [ 746.484795][T18600] ? __d_alloc+0x36/0x370 [ 746.489110][T18600] __should_failslab+0x81/0x90 [ 746.493963][T18600] should_failslab+0x5/0x20 [ 746.498444][T18600] kmem_cache_alloc+0x36/0x2e0 [ 746.503185][T18600] ? security_inode_alloc+0x127/0x170 [ 746.508540][T18600] ? __init_rwsem+0x59/0x70 [ 746.513036][T18600] __d_alloc+0x36/0x370 [ 746.517238][T18600] ? current_time+0xdb/0x190 [ 746.521808][T18600] d_alloc_pseudo+0x1a/0x50 [ 746.526296][T18600] alloc_file_pseudo+0x63/0x130 [ 746.531139][T18600] __shmem_file_setup+0x13a/0x1c0 [ 746.536244][T18600] shmem_file_setup+0x37/0x40 [ 746.540972][T18600] __se_sys_memfd_create+0x1eb/0x370 [ 746.546273][T18600] __x64_sys_memfd_create+0x2d/0x40 [ 746.551490][T18600] do_syscall_64+0x39/0x80 [ 746.555887][T18600] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 746.561794][T18600] RIP: 0033:0x45e219 [ 746.565665][T18600] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 746.585319][T18600] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 746.593721][T18600] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 746.601788][T18600] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 746.609812][T18600] RBP: 0000000008100000 R08: 0000000020000248 R09: 0000000000000000 [ 746.617780][T18600] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 10:58:58 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 746.625730][T18600] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 746.653423][T18582] EXT4-fs (loop4): Test dummy encryption mode enabled [ 746.653790][T18588] EXT4-fs (loop2): Test dummy encryption mode enabled [ 746.660491][T18587] EXT4-fs (loop3): Test dummy encryption mode enabled [ 746.681760][T18588] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 746.710895][T18602] loop5: detected capacity change from 512 to 0 [ 746.721415][T18582] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 4)! [ 746.721509][T18588] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 746.733111][T18587] EXT4-fs (loop3): inodes count not valid: 46333984 vs 32 [ 746.743963][T18582] EXT4-fs (loop4): group descriptors corrupted! [ 746.750706][T18588] EXT4-fs (loop2): get root inode failed [ 746.770298][T18602] EXT4-fs (loop5): Test dummy encryption mode enabled [ 746.787220][T18588] EXT4-fs (loop2): mount failed [ 746.798903][T18602] EXT4-fs (loop5): inodes count not valid: 6291488 vs 32 [ 746.824917][T18609] FAULT_INJECTION: forcing a failure. 10:58:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000900000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 746.824917][T18609] name failslab, interval 1, probability 0, space 0, times 0 [ 746.866544][T18609] CPU: 0 PID: 18609 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 746.877454][T18609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.888374][T18609] Call Trace: [ 746.892265][T18609] dump_stack+0x116/0x15d [ 746.898082][T18609] should_fail+0x231/0x240 [ 746.903231][T18609] ? __alloc_file+0x2e/0x1a0 [ 746.908977][T18609] __should_failslab+0x81/0x90 [ 746.914875][T18609] should_failslab+0x5/0x20 [ 746.920389][T18609] kmem_cache_alloc+0x36/0x2e0 [ 746.925697][T18609] ? __d_alloc+0x36/0x370 [ 746.931541][T18609] __alloc_file+0x2e/0x1a0 [ 746.939117][T18609] alloc_empty_file+0xcd/0x1c0 [ 746.945157][T18609] alloc_file+0x3a/0x280 [ 746.952241][T18609] alloc_file_pseudo+0xe2/0x130 [ 746.957244][T18609] __shmem_file_setup+0x13a/0x1c0 [ 746.962312][T18609] shmem_file_setup+0x37/0x40 [ 746.967062][T18609] __se_sys_memfd_create+0x1eb/0x370 [ 746.972401][T18609] __x64_sys_memfd_create+0x2d/0x40 [ 746.977605][T18609] do_syscall_64+0x39/0x80 [ 746.982030][T18609] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 746.987917][T18609] RIP: 0033:0x45e219 [ 746.991803][T18609] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:58:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000e0024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 747.011414][T18609] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 747.019866][T18609] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 747.027821][T18609] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 747.035776][T18609] RBP: 0000000008100000 R08: 0000000020000248 R09: 0000000000000000 [ 747.043829][T18609] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 747.051789][T18609] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 10:58:58 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 747.112256][T18611] loop0: detected capacity change from 512 to 0 [ 747.145355][T18611] EXT4-fs (loop0): Test dummy encryption mode enabled 10:58:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000011000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 747.164362][T18602] loop5: detected capacity change from 512 to 0 [ 747.187422][T18611] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 747.190597][T11915] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 747.221994][T18623] loop3: detected capacity change from 512 to 0 [ 747.229772][T18625] FAULT_INJECTION: forcing a failure. [ 747.229772][T18625] name failslab, interval 1, probability 0, space 0, times 0 [ 747.247369][T18625] CPU: 1 PID: 18625 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 747.256772][T18625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.266991][T18625] Call Trace: [ 747.270262][T18625] dump_stack+0x116/0x15d [ 747.274637][T18625] should_fail+0x231/0x240 [ 747.279084][T18625] ? security_file_alloc+0x2e/0x190 [ 747.284290][T18625] __should_failslab+0x81/0x90 [ 747.289079][T18625] should_failslab+0x5/0x20 [ 747.293574][T18625] kmem_cache_alloc+0x36/0x2e0 [ 747.298389][T18625] ? __alloc_file+0x2e/0x1a0 [ 747.302957][T18625] security_file_alloc+0x2e/0x190 [ 747.307980][T18625] __alloc_file+0x83/0x1a0 [ 747.312417][T18625] alloc_empty_file+0xcd/0x1c0 [ 747.317207][T18625] alloc_file+0x3a/0x280 [ 747.321501][T18625] alloc_file_pseudo+0xe2/0x130 [ 747.326334][T18625] __shmem_file_setup+0x13a/0x1c0 [ 747.331349][T18625] shmem_file_setup+0x37/0x40 [ 747.336014][T18625] __se_sys_memfd_create+0x1eb/0x370 [ 747.341317][T18625] __x64_sys_memfd_create+0x2d/0x40 [ 747.346521][T18625] do_syscall_64+0x39/0x80 [ 747.350940][T18625] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 747.356826][T18625] RIP: 0033:0x45e219 [ 747.360715][T18625] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.380324][T18625] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 747.388791][T18625] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 747.396892][T18625] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 747.404966][T18625] RBP: 0000000008100000 R08: 0000000020000248 R09: 0000000000000000 [ 747.412917][T18625] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 747.420891][T18625] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 747.450506][T18602] EXT4-fs (loop5): Test dummy encryption mode enabled [ 747.457709][ T2198] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 10:58:59 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 747.461046][T18623] EXT4-fs (loop3): Test dummy encryption mode enabled [ 747.468591][ T2198] Buffer I/O error on dev loop4, logical block 0, async page read [ 747.483445][ T2198] blk_update_request: I/O error, dev loop4, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 747.494355][ T2198] Buffer I/O error on dev loop4, logical block 1, async page read [ 747.498928][T18602] EXT4-fs (loop5): inodes count not valid: 6291488 vs 32 [ 747.502315][ T2198] blk_update_request: I/O error, dev loop4, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 10:58:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000a000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 747.520470][ T2198] Buffer I/O error on dev loop4, logical block 2, async page read [ 747.528408][ T2198] blk_update_request: I/O error, dev loop4, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 747.539311][ T2198] Buffer I/O error on dev loop4, logical block 3, async page read [ 747.547516][ T2198] blk_update_request: I/O error, dev loop4, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 747.560813][ T2198] Buffer I/O error on dev loop4, logical block 4, async page read [ 747.569417][T18623] EXT4-fs (loop3): inodes count not valid: 48234528 vs 32 [ 747.569424][ T2198] blk_update_request: I/O error, dev loop4, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 747.588007][ T2198] Buffer I/O error on dev loop4, logical block 5, async page read [ 747.597060][ T2198] blk_update_request: I/O error, dev loop4, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 747.608300][ T2198] Buffer I/O error on dev loop4, logical block 6, async page read [ 747.617274][ T2198] blk_update_request: I/O error, dev loop4, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 747.628224][ T2198] Buffer I/O error on dev loop4, logical block 7, async page read 10:58:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200068004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 747.671405][T18633] FAULT_INJECTION: forcing a failure. [ 747.671405][T18633] name failslab, interval 1, probability 0, space 0, times 0 [ 747.698178][T18633] CPU: 0 PID: 18633 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 747.708424][T18633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.720429][T18633] Call Trace: [ 747.723703][T18633] dump_stack+0x116/0x15d [ 747.728897][T18633] should_fail+0x231/0x240 [ 747.735915][T18633] __should_failslab+0x81/0x90 [ 747.742675][T18633] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 747.751212][T18633] should_failslab+0x5/0x20 [ 747.756626][T18633] __kmalloc+0x59/0x360 [ 747.761939][T18633] tomoyo_realpath_from_path+0x98/0x3b0 [ 747.767492][T18633] tomoyo_path_perm+0xc6/0x330 [ 747.773004][T18633] tomoyo_path_truncate+0x18/0x20 [ 747.778270][T18633] security_path_truncate+0x7f/0xd0 [ 747.784044][T18633] do_sys_ftruncate+0x38d/0x530 [ 747.789080][T18633] ? fpregs_assert_state_consistent+0x7d/0x90 [ 747.795162][T18633] __x64_sys_ftruncate+0x2f/0x40 [ 747.800442][T18633] do_syscall_64+0x39/0x80 [ 747.804846][T18633] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 747.810721][T18633] RIP: 0033:0x45e1e7 [ 747.814680][T18633] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.834485][T18633] RSP: 002b:00007feefa74ca18 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 747.842874][T18633] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e1e7 [ 747.850826][T18633] RDX: 0000000020000248 RSI: 0000000008100000 RDI: 0000000000000004 [ 747.858950][T18633] RBP: 0000000008100000 R08: 0000000020000248 R09: 0000000000000000 [ 747.866902][T18633] R10: fe03f80fe03f80ff R11: 0000000000000217 R12: 0000000000000003 [ 747.874887][T18633] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000040 [ 747.885307][T18633] ERROR: Out of memory at tomoyo_realpath_from_path. [ 747.902632][T18633] loop1: detected capacity change from 264192 to 0 [ 747.981284][T18637] loop2: detected capacity change from 512 to 0 [ 747.989422][T18633] EXT4-fs (loop1): Test dummy encryption mode enabled [ 748.001299][T18636] loop4: detected capacity change from 512 to 0 [ 748.038074][T18636] EXT4-fs (loop4): Test dummy encryption mode enabled [ 748.045513][T18633] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 748.064498][T18648] loop3: detected capacity change from 512 to 0 [ 748.079029][T18636] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 748.094059][T18654] loop5: detected capacity change from 512 to 0 [ 748.105273][T18637] EXT4-fs (loop2): Test dummy encryption mode enabled 10:58:59 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 748.133224][T18637] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 748.137465][T18653] loop0: detected capacity change from 512 to 0 [ 748.157728][T18648] EXT4-fs (loop3): Test dummy encryption mode enabled [ 748.161337][T18654] EXT4-fs (loop5): Test dummy encryption mode enabled [ 748.174104][T18648] EXT4-fs (loop3): inodes count not valid: 48234528 vs 32 10:58:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002100000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 748.186221][T18653] EXT4-fs (loop0): Test dummy encryption mode enabled [ 748.203774][T18654] EXT4-fs (loop5): inodes count not valid: 6815776 vs 32 [ 748.203795][T18637] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 748.203967][T18637] EXT4-fs (loop2): get root inode failed 10:59:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000b000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 748.242384][T18653] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 748.255383][T18637] EXT4-fs (loop2): mount failed [ 748.270177][T18668] FAULT_INJECTION: forcing a failure. [ 748.270177][T18668] name failslab, interval 1, probability 0, space 0, times 0 [ 748.283091][T18668] CPU: 1 PID: 18668 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 748.293637][T18668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.303690][T18668] Call Trace: [ 748.307115][T18668] dump_stack+0x116/0x15d [ 748.311429][T18668] should_fail+0x231/0x240 [ 748.315825][T18668] __should_failslab+0x81/0x90 [ 748.320571][T18668] ? tomoyo_encode2+0x1d3/0x350 [ 748.325417][T18668] should_failslab+0x5/0x20 [ 748.329950][T18668] __kmalloc+0x59/0x360 [ 748.334090][T18668] tomoyo_encode2+0x1d3/0x350 [ 748.338749][T18668] ? dynamic_dname+0xf0/0xf0 [ 748.343482][T18668] tomoyo_realpath_from_path+0x35e/0x3b0 [ 748.349106][T18668] tomoyo_path_perm+0xc6/0x330 [ 748.353852][T18668] tomoyo_path_truncate+0x18/0x20 [ 748.359116][T18668] security_path_truncate+0x7f/0xd0 [ 748.364354][T18668] do_sys_ftruncate+0x38d/0x530 [ 748.369229][T18668] ? fpregs_assert_state_consistent+0x7d/0x90 [ 748.375278][T18668] __x64_sys_ftruncate+0x2f/0x40 [ 748.380251][T18668] do_syscall_64+0x39/0x80 [ 748.384756][T18668] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 748.390650][T18668] RIP: 0033:0x45e1e7 [ 748.394530][T18668] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 748.414144][T18668] RSP: 002b:00007feefa74ca18 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 748.422605][T18668] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e1e7 [ 748.430569][T18668] RDX: 0000000020000248 RSI: 0000000008100000 RDI: 0000000000000004 10:59:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000ec024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 748.438633][T18668] RBP: 0000000008100000 R08: 0000000020000248 R09: 0000000000000000 [ 748.446618][T18668] R10: fe03f80fe03f80ff R11: 0000000000000217 R12: 0000000000000003 [ 748.454577][T18668] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000040 [ 748.464395][T18668] ERROR: Out of memory at tomoyo_realpath_from_path. 10:59:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000012000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 748.658277][T18668] loop1: detected capacity change from 264192 to 0 [ 748.669148][T18678] loop4: detected capacity change from 512 to 0 [ 748.680592][T18654] loop5: detected capacity change from 512 to 0 [ 748.688389][T18668] EXT4-fs (loop1): Test dummy encryption mode enabled [ 748.698674][T18678] EXT4-fs (loop4): Test dummy encryption mode enabled [ 748.708040][T18654] EXT4-fs (loop5): Test dummy encryption mode enabled [ 748.716958][T18654] EXT4-fs (loop5): inodes count not valid: 6815776 vs 32 [ 748.736446][T18678] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 748.750860][T18668] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:59:00 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20006c004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 748.782810][T18687] loop3: detected capacity change from 512 to 0 [ 748.800357][T18690] loop0: detected capacity change from 512 to 0 [ 748.812790][T18691] loop2: detected capacity change from 512 to 0 [ 748.842603][T18687] EXT4-fs (loop3): Test dummy encryption mode enabled [ 748.864650][T18687] EXT4-fs (loop3): inodes count not valid: 49020960 vs 32 10:59:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200074004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002200000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 748.901485][T18690] EXT4-fs (loop0): Test dummy encryption mode enabled [ 748.923642][T18690] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 748.949070][T18705] FAULT_INJECTION: forcing a failure. [ 748.949070][T18705] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 748.952460][T18691] EXT4-fs (loop2): Test dummy encryption mode enabled [ 748.979361][T18705] CPU: 1 PID: 18705 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 748.988168][T18705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.990597][T18691] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 748.998287][T18705] Call Trace: [ 748.998297][T18705] dump_stack+0x116/0x15d [ 749.023041][T18705] should_fail+0x231/0x240 [ 749.028685][T18705] __alloc_pages_nodemask+0xd8/0x350 [ 749.035399][T18705] alloc_pages_vma+0x3e6/0x890 [ 749.042292][T18705] shmem_alloc_and_acct_page+0x2ba/0x650 [ 749.048049][T18705] ? __rcu_read_unlock+0x51/0x250 [ 749.053431][T18705] shmem_getpage_gfp+0x6b3/0x1960 [ 749.058753][T18705] shmem_write_begin+0x80/0x100 [ 749.064210][T18705] generic_perform_write+0x196/0x3a0 [ 749.069792][T18691] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 749.071059][T18705] __generic_file_write_iter+0x15c/0x330 [ 749.083230][T18691] EXT4-fs (loop2): get root inode failed [ 749.088652][T18705] ? generic_write_checks+0x250/0x290 [ 749.088674][T18705] generic_file_write_iter+0x75/0x130 [ 749.088691][T18705] vfs_write+0x6d4/0x7c0 [ 749.107606][T18691] EXT4-fs (loop2): mount failed [ 749.110027][T18705] __x64_sys_pwrite64+0xf5/0x150 [ 749.110047][T18705] do_syscall_64+0x39/0x80 [ 749.126749][T18705] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 749.134099][T18705] RIP: 0033:0x417d77 [ 749.138312][T18705] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 749.157922][T18705] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 749.166410][T18705] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000417d77 [ 749.174364][T18705] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 749.182338][T18705] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 749.190295][T18705] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000003 10:59:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 749.198347][T18705] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 10:59:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000c000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 749.228432][T18712] loop4: detected capacity change from 512 to 0 [ 749.243699][T18705] loop1: detected capacity change from 264192 to 0 [ 749.253735][T18709] loop5: detected capacity change from 512 to 0 [ 749.301655][T18705] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 749.301942][T18712] EXT4-fs (loop4): Test dummy encryption mode enabled [ 749.321483][T18712] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:59:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000001a000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 749.355207][T18709] EXT4-fs (loop5): Test dummy encryption mode enabled [ 749.364308][T18709] EXT4-fs (loop5): inodes count not valid: 7602208 vs 32 10:59:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002300000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:01 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20007a004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 749.475430][T18735] FAULT_INJECTION: forcing a failure. [ 749.475430][T18735] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 749.488626][T18735] CPU: 0 PID: 18735 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 749.497501][T18735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.507555][T18735] Call Trace: [ 749.510837][T18735] dump_stack+0x116/0x15d [ 749.515174][T18735] should_fail+0x231/0x240 [ 749.519695][T18735] should_fail_usercopy+0x16/0x20 [ 749.524728][T18735] iov_iter_copy_from_user_atomic+0x2c3/0x8a0 [ 749.530808][T18735] ? shmem_write_begin+0x80/0x100 [ 749.535843][T18735] generic_perform_write+0x1e4/0x3a0 [ 749.541195][T18735] __generic_file_write_iter+0x15c/0x330 [ 749.546825][T18735] ? generic_write_checks+0x250/0x290 [ 749.552295][T18735] generic_file_write_iter+0x75/0x130 [ 749.557660][T18735] vfs_write+0x6d4/0x7c0 [ 749.561897][T18735] __x64_sys_pwrite64+0xf5/0x150 [ 749.566826][T18735] do_syscall_64+0x39/0x80 [ 749.571309][T18735] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 749.577186][T18735] RIP: 0033:0x417d77 [ 749.581064][T18735] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 749.600893][T18735] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 749.609372][T18735] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000417d77 [ 749.617373][T18735] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 749.625468][T18735] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 749.633419][T18735] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000003 [ 749.641390][T18735] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 [ 749.728234][T18729] loop3: detected capacity change from 512 to 0 [ 749.735393][T18735] loop1: detected capacity change from 264192 to 0 [ 749.743806][T18733] loop0: detected capacity change from 512 to 0 [ 749.752992][T18733] EXT4-fs (loop0): Test dummy encryption mode enabled [ 749.763070][T18736] loop4: detected capacity change from 512 to 0 [ 749.764019][T18733] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 749.779661][T18734] loop2: detected capacity change from 512 to 0 [ 749.791467][T18734] EXT4-fs (loop2): Test dummy encryption mode enabled [ 749.798699][T18734] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 749.801013][T18735] EXT4-fs (loop1): Test dummy encryption mode enabled [ 749.823180][T18729] EXT4-fs (loop3): Test dummy encryption mode enabled [ 749.832293][T18734] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 749.832433][T18736] EXT4-fs (loop4): Test dummy encryption mode enabled [ 749.852308][T18729] EXT4-fs (loop3): inodes count not valid: 50331680 vs 32 [ 749.880062][T18736] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 749.880061][T18735] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 749.901330][T18734] EXT4-fs (loop2): get root inode failed [ 749.925179][T18734] EXT4-fs (loop2): mount failed 10:59:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000d000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 749.928767][T18757] loop5: detected capacity change from 512 to 0 [ 749.947940][T18729] loop3: detected capacity change from 512 to 0 10:59:01 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 749.991835][T18757] EXT4-fs (loop5): Test dummy encryption mode enabled [ 749.999087][T18757] EXT4-fs (loop5): inodes count not valid: 7995424 vs 32 10:59:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002400000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000020000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 750.041307][T18729] EXT4-fs (loop3): Test dummy encryption mode enabled [ 750.052746][T18729] EXT4-fs (loop3): inodes count not valid: 50331680 vs 32 10:59:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200089004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20001f034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 750.174662][T18778] FAULT_INJECTION: forcing a failure. [ 750.174662][T18778] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 750.190130][T18778] CPU: 1 PID: 18778 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 750.199039][T18778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.209092][T18778] Call Trace: [ 750.212353][T18778] dump_stack+0x116/0x15d [ 750.216838][T18778] should_fail+0x231/0x240 [ 750.221283][T18778] __alloc_pages_nodemask+0xd8/0x350 [ 750.226545][T18778] alloc_pages_vma+0x3e6/0x890 [ 750.231328][T18778] shmem_alloc_and_acct_page+0x2ba/0x650 [ 750.237020][T18778] ? __rcu_read_unlock+0x51/0x250 [ 750.242094][T18778] shmem_getpage_gfp+0x6b3/0x1960 [ 750.247193][T18778] shmem_write_begin+0x80/0x100 [ 750.252047][T18778] generic_perform_write+0x196/0x3a0 [ 750.257318][T18778] ? shmem_write_begin+0x100/0x100 [ 750.262824][T18778] __generic_file_write_iter+0x15c/0x330 [ 750.268446][T18778] ? generic_write_checks+0x250/0x290 [ 750.273864][T18778] generic_file_write_iter+0x75/0x130 [ 750.279216][T18778] vfs_write+0x6d4/0x7c0 [ 750.283440][T18778] __x64_sys_pwrite64+0xf5/0x150 [ 750.288383][T18778] do_syscall_64+0x39/0x80 [ 750.292780][T18778] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 750.298755][T18778] RIP: 0033:0x417d77 [ 750.302632][T18778] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 750.322468][T18778] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 750.330868][T18778] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417d77 [ 750.338833][T18778] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 750.346798][T18778] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 750.354869][T18778] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000003 [ 750.362859][T18778] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 [ 750.454675][T18774] loop4: detected capacity change from 512 to 0 [ 750.465636][T18777] loop2: detected capacity change from 512 to 0 [ 750.476282][T18772] loop0: detected capacity change from 512 to 0 [ 750.494616][T18774] EXT4-fs (loop4): Test dummy encryption mode enabled [ 750.505514][T18778] loop1: detected capacity change from 264192 to 0 [ 750.531576][T18772] EXT4-fs (loop0): Test dummy encryption mode enabled [ 750.538956][T18777] EXT4-fs (loop2): Test dummy encryption mode enabled [ 750.570061][T18778] EXT4-fs (loop1): Test dummy encryption mode enabled [ 750.579709][T18777] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 750.627626][T18774] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 750.642140][T18778] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 750.652025][T18794] loop5: detected capacity change from 512 to 0 [ 750.660245][T18772] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 750.662374][T18794] EXT4-fs (loop5): Test dummy encryption mode enabled [ 750.680734][T18794] EXT4-fs (loop5): inodes count not valid: 8978464 vs 32 [ 750.690042][T18777] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated 10:59:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000e000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 750.722512][T18778] EXT4-fs (loop1): group descriptors corrupted! [ 750.729543][T18777] EXT4-fs (loop2): get root inode failed [ 750.744442][T18799] loop3: detected capacity change from 512 to 0 [ 750.752452][T18777] EXT4-fs (loop2): mount failed [ 750.806849][T18794] loop5: detected capacity change from 512 to 0 [ 750.902609][T18799] EXT4-fs (loop3): Test dummy encryption mode enabled [ 750.919912][T18794] EXT4-fs (loop5): Test dummy encryption mode enabled 10:59:02 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002500000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000021000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 750.946457][T18799] EXT4-fs (loop3): inodes count not valid: 52363296 vs 32 [ 750.973420][T18794] EXT4-fs (loop5): inodes count not valid: 8978464 vs 32 [ 751.020044][T18816] FAULT_INJECTION: forcing a failure. [ 751.020044][T18816] name failslab, interval 1, probability 0, space 0, times 0 [ 751.032660][T18816] CPU: 1 PID: 18816 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 751.041408][T18816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.051519][T18816] Call Trace: [ 751.054809][T18816] dump_stack+0x116/0x15d [ 751.059140][T18816] should_fail+0x231/0x240 [ 751.063629][T18816] ? xas_create+0x42b/0xba0 [ 751.068161][T18816] __should_failslab+0x81/0x90 [ 751.072927][T18816] should_failslab+0x5/0x20 [ 751.077415][T18816] kmem_cache_alloc+0x36/0x2e0 [ 751.082162][T18816] xas_create+0x42b/0xba0 [ 751.086584][T18816] xas_create_range+0x12e/0x330 [ 751.091414][T18816] shmem_add_to_page_cache+0x3dd/0x6a0 [ 751.096854][T18816] shmem_getpage_gfp+0x85a/0x1960 [ 751.101859][T18816] shmem_write_begin+0x80/0x100 [ 751.106827][T18816] generic_perform_write+0x196/0x3a0 [ 751.112119][T18816] ? shmem_write_begin+0x100/0x100 [ 751.117269][T18816] __generic_file_write_iter+0x15c/0x330 [ 751.122883][T18816] ? generic_write_checks+0x250/0x290 [ 751.128287][T18816] generic_file_write_iter+0x75/0x130 [ 751.133636][T18816] vfs_write+0x6d4/0x7c0 [ 751.137931][T18816] __x64_sys_pwrite64+0xf5/0x150 [ 751.142912][T18816] do_syscall_64+0x39/0x80 [ 751.147352][T18816] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 751.153223][T18816] RIP: 0033:0x417d77 [ 751.157093][T18816] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 751.176821][T18816] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 751.185214][T18816] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417d77 [ 751.193165][T18816] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 751.201125][T18816] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 751.209105][T18816] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000003 [ 751.217105][T18816] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 [ 751.255877][T18813] loop0: detected capacity change from 512 to 0 10:59:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200045034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 751.328121][T18816] loop1: detected capacity change from 264192 to 0 10:59:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c6004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 751.370950][T18816] EXT4-fs (loop1): Test dummy encryption mode enabled [ 751.389839][T18823] loop2: detected capacity change from 512 to 0 [ 751.410789][T18813] EXT4-fs (loop0): Test dummy encryption mode enabled [ 751.427480][T18816] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 751.440938][T18813] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 751.511489][T18829] loop3: detected capacity change from 512 to 0 [ 751.518488][T18823] EXT4-fs (loop2): Test dummy encryption mode enabled [ 751.522908][T18829] EXT4-fs (loop3): Test dummy encryption mode enabled [ 751.537547][T18828] loop4: detected capacity change from 512 to 0 [ 751.546431][T18823] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended 10:59:03 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 751.573951][T18823] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 751.588028][T18828] EXT4-fs (loop4): Test dummy encryption mode enabled [ 751.596807][T18823] EXT4-fs (loop2): get root inode failed [ 751.604851][T18823] EXT4-fs (loop2): mount failed [ 751.611992][T18828] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:59:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000f000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 751.631935][T18829] EXT4-fs (loop3): inodes count not valid: 54853664 vs 32 [ 751.682829][T18848] FAULT_INJECTION: forcing a failure. [ 751.682829][T18848] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 751.695982][T18848] CPU: 0 PID: 18848 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 751.704796][T18848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.714851][T18848] Call Trace: [ 751.718131][T18848] dump_stack+0x116/0x15d [ 751.722464][T18848] should_fail+0x231/0x240 [ 751.726932][T18848] should_fail_usercopy+0x16/0x20 [ 751.731971][T18848] iov_iter_copy_from_user_atomic+0x2c3/0x8a0 [ 751.738074][T18848] ? shmem_write_begin+0x80/0x100 [ 751.743080][T18848] generic_perform_write+0x1e4/0x3a0 [ 751.748345][T18848] ? shmem_write_begin+0x100/0x100 [ 751.753501][T18848] __generic_file_write_iter+0x15c/0x330 [ 751.759201][T18848] ? generic_write_checks+0x250/0x290 [ 751.764599][T18848] generic_file_write_iter+0x75/0x130 [ 751.769969][T18848] vfs_write+0x6d4/0x7c0 [ 751.774226][T18848] __x64_sys_pwrite64+0xf5/0x150 [ 751.779168][T18848] do_syscall_64+0x39/0x80 [ 751.783577][T18848] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 751.789464][T18848] RIP: 0033:0x417d77 [ 751.793335][T18848] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 751.812981][T18848] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 751.821377][T18848] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417d77 [ 751.829422][T18848] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 751.837446][T18848] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 751.845397][T18848] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000003 [ 751.853350][T18848] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000228 [ 751.961520][T18848] loop1: detected capacity change from 264192 to 0 [ 751.975748][T18844] loop5: detected capacity change from 512 to 0 10:59:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002600000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 752.015859][T18829] loop3: detected capacity change from 512 to 0 [ 752.030850][T18848] EXT4-fs (loop1): Test dummy encryption mode enabled [ 752.039227][T18844] EXT4-fs (loop5): Test dummy encryption mode enabled [ 752.054905][T18848] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 752.055356][T18829] EXT4-fs (loop3): Test dummy encryption mode enabled [ 752.086826][T18844] EXT4-fs (loop5): inodes count not valid: 12976160 vs 32 10:59:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000027000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:03 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 752.126499][T18863] loop0: detected capacity change from 512 to 0 [ 752.142762][T18863] EXT4-fs (loop0): Test dummy encryption mode enabled [ 752.152840][T18863] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:59:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c7004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000010000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 752.219057][T18829] EXT4-fs (loop3): inodes count not valid: 54853664 vs 32 [ 752.236023][T18871] loop2: detected capacity change from 512 to 0 [ 752.245314][T18872] loop4: detected capacity change from 512 to 0 10:59:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20004d034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 752.412313][T18871] EXT4-fs (loop2): Test dummy encryption mode enabled [ 752.419354][T18872] EXT4-fs (loop4): Test dummy encryption mode enabled [ 752.443819][T18871] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 752.498847][T18882] FAULT_INJECTION: forcing a failure. [ 752.498847][T18882] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 752.547125][T18871] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 752.549548][T18882] CPU: 0 PID: 18882 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 752.561352][T18872] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 752.567948][T18882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.567962][T18882] Call Trace: [ 752.567969][T18882] dump_stack+0x116/0x15d [ 752.598429][T18882] should_fail+0x231/0x240 [ 752.603700][T18882] __alloc_pages_nodemask+0xd8/0x350 [ 752.605034][T18871] EXT4-fs (loop2): get root inode failed [ 752.608988][T18882] alloc_pages_vma+0x3e6/0x890 [ 752.609017][T18882] shmem_alloc_and_acct_page+0x2ba/0x650 [ 752.625452][T18882] ? __rcu_read_unlock+0x51/0x250 [ 752.630482][T18882] shmem_getpage_gfp+0x6b3/0x1960 [ 752.636706][T18882] shmem_write_begin+0x80/0x100 [ 752.636761][T18871] EXT4-fs (loop2): mount failed [ 752.641588][T18882] generic_perform_write+0x196/0x3a0 [ 752.641614][T18882] __generic_file_write_iter+0x15c/0x330 [ 752.659864][T18882] ? generic_write_checks+0x250/0x290 [ 752.665284][T18882] generic_file_write_iter+0x75/0x130 [ 752.672267][T18882] vfs_write+0x6d4/0x7c0 [ 752.676578][T18882] __x64_sys_pwrite64+0xf5/0x150 [ 752.681519][T18882] do_syscall_64+0x39/0x80 [ 752.687261][T18882] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 752.693224][T18882] RIP: 0033:0x417d77 [ 752.697384][T18882] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 752.717085][T18882] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 752.725499][T18882] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000417d77 [ 752.733471][T18882] RDX: 000000000000001d RSI: 0000000020012600 RDI: 0000000000000004 [ 752.741439][T18882] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 752.749400][T18882] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000003 [ 752.757467][T18882] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 752.787700][T18893] loop3: detected capacity change from 512 to 0 [ 752.808655][T18892] loop5: detected capacity change from 512 to 0 [ 752.830558][T18882] loop1: detected capacity change from 264192 to 0 [ 752.862172][T18889] loop0: detected capacity change from 512 to 0 [ 752.911011][T18882] EXT4-fs (loop1): Test dummy encryption mode enabled [ 752.919205][T18889] EXT4-fs (loop0): Test dummy encryption mode enabled [ 752.930687][T18892] EXT4-fs (loop5): Test dummy encryption mode enabled [ 752.945640][T18893] EXT4-fs (loop3): Test dummy encryption mode enabled 10:59:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002700000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000002e000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 752.973797][T18892] EXT4-fs (loop5): inodes count not valid: 13041696 vs 32 [ 752.983435][T18893] EXT4-fs (loop3): inodes count not valid: 55377952 vs 32 [ 752.993098][T18882] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 753.010282][T18882] EXT4-fs (loop1): get root inode failed [ 753.022193][T18889] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 753.024871][T18882] EXT4-fs (loop1): mount failed 10:59:04 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000011000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 753.134394][T18892] loop5: detected capacity change from 512 to 0 [ 753.181415][T18893] loop3: detected capacity change from 512 to 0 [ 753.188748][T18892] EXT4-fs (loop5): Test dummy encryption mode enabled [ 753.190949][T18913] loop2: detected capacity change from 512 to 0 [ 753.215032][T18915] loop4: detected capacity change from 512 to 0 [ 753.221672][T18923] FAULT_INJECTION: forcing a failure. [ 753.221672][T18923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 753.223160][T18892] EXT4-fs (loop5): inodes count not valid: 13041696 vs 32 [ 753.234772][T18923] CPU: 0 PID: 18923 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 753.250805][T18923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.260856][T18923] Call Trace: [ 753.264149][T18923] dump_stack+0x116/0x15d [ 753.268534][T18923] should_fail+0x231/0x240 [ 753.273016][T18923] should_fail_usercopy+0x16/0x20 [ 753.278025][T18923] iov_iter_copy_from_user_atomic+0x2c3/0x8a0 [ 753.284153][T18923] ? shmem_write_begin+0x80/0x100 [ 753.289195][T18923] generic_perform_write+0x1e4/0x3a0 [ 753.294499][T18923] ? shmem_write_begin+0x100/0x100 [ 753.299730][T18923] __generic_file_write_iter+0x15c/0x330 [ 753.305353][T18923] ? generic_write_checks+0x250/0x290 [ 753.310738][T18923] generic_file_write_iter+0x75/0x130 [ 753.316092][T18923] vfs_write+0x6d4/0x7c0 [ 753.320321][T18923] __x64_sys_pwrite64+0xf5/0x150 [ 753.325278][T18923] do_syscall_64+0x39/0x80 [ 753.329678][T18923] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 753.335684][T18923] RIP: 0033:0x417d77 [ 753.339559][T18923] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 753.359182][T18923] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 753.367574][T18923] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000417d77 [ 753.375531][T18923] RDX: 000000000000001d RSI: 0000000020012600 RDI: 0000000000000004 [ 753.383481][T18923] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 753.391480][T18923] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000003 [ 753.399438][T18923] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000240 [ 753.411336][T18915] EXT4-fs (loop4): Test dummy encryption mode enabled [ 753.428691][T18915] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 753.470037][T18893] EXT4-fs (loop3): Test dummy encryption mode enabled [ 753.478144][T18893] EXT4-fs (loop3): inodes count not valid: 55377952 vs 32 10:59:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c8004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 753.528731][T18923] loop1: detected capacity change from 264192 to 0 10:59:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a5034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002800000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 753.615825][T18927] loop0: detected capacity change from 512 to 0 [ 753.622738][T18913] EXT4-fs (loop2): Test dummy encryption mode enabled [ 753.661665][T18923] EXT4-fs (loop1): Test dummy encryption mode enabled [ 753.673177][T18913] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 753.718109][T18913] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 753.732009][T18923] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 753.755025][T18927] EXT4-fs (loop0): Test dummy encryption mode enabled 10:59:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c9004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 753.794337][T18913] EXT4-fs (loop2): get root inode failed [ 753.801922][T18927] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 753.810418][T18913] EXT4-fs (loop2): mount failed [ 753.861410][T18945] loop3: detected capacity change from 512 to 0 [ 753.917149][T18944] loop4: detected capacity change from 512 to 0 [ 753.946190][T18952] loop5: detected capacity change from 512 to 0 [ 753.956116][T18945] EXT4-fs (loop3): Test dummy encryption mode enabled 10:59:05 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002900000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000012000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 754.000401][T18945] EXT4-fs (loop3): inodes count not valid: 61145120 vs 32 [ 754.004518][T18944] EXT4-fs (loop4): Test dummy encryption mode enabled [ 754.016410][T18952] EXT4-fs (loop5): Test dummy encryption mode enabled [ 754.026547][T18944] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 754.028228][T18952] EXT4-fs (loop5): inodes count not valid: 13172768 vs 32 10:59:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000003f000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f0034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 754.089174][T18963] FAULT_INJECTION: forcing a failure. [ 754.089174][T18963] name failslab, interval 1, probability 0, space 0, times 0 [ 754.120547][T18963] CPU: 0 PID: 18963 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 754.129504][T18963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.139561][T18963] Call Trace: [ 754.142847][T18963] dump_stack+0x116/0x15d [ 754.147207][T18963] should_fail+0x231/0x240 [ 754.151623][T18963] ? getname_flags+0x84/0x3d0 [ 754.156375][T18963] __should_failslab+0x81/0x90 [ 754.161178][T18963] should_failslab+0x5/0x20 [ 754.165668][T18963] kmem_cache_alloc+0x36/0x2e0 [ 754.170427][T18963] getname_flags+0x84/0x3d0 [ 754.175035][T18963] getname+0x15/0x20 [ 754.178907][T18963] do_sys_openat2+0x5b/0x240 [ 754.183510][T18963] __x64_sys_open+0xe2/0x110 [ 754.188090][T18963] do_syscall_64+0x39/0x80 [ 754.192591][T18963] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 754.198463][T18963] RIP: 0033:0x417d11 [ 754.202390][T18963] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 754.222096][T18963] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 754.230689][T18963] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417d11 10:59:06 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 754.238688][T18963] RDX: 000000000000001d RSI: 0000000000000002 RDI: 00007feefa74cad0 [ 754.246817][T18963] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 754.254775][T18963] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000003 [ 754.263147][T18963] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 754.441050][T18967] loop4: detected capacity change from 512 to 0 [ 754.465264][T18972] loop2: detected capacity change from 512 to 0 [ 754.490608][T18967] EXT4-fs (loop4): Test dummy encryption mode enabled [ 754.517807][T18982] FAULT_INJECTION: forcing a failure. [ 754.517807][T18982] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 754.523095][T18952] loop5: detected capacity change from 512 to 0 [ 754.539323][T18952] EXT4-fs (loop5): Test dummy encryption mode enabled [ 754.546924][T18952] EXT4-fs (loop5): inodes count not valid: 13172768 vs 32 [ 754.554733][T18982] CPU: 1 PID: 18982 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 754.563508][T18982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.573691][T18982] Call Trace: [ 754.577026][T18982] dump_stack+0x116/0x15d [ 754.581389][T18982] should_fail+0x231/0x240 [ 754.585789][T18982] should_fail_usercopy+0x16/0x20 [ 754.590949][T18982] strncpy_from_user+0x21/0x250 [ 754.595803][T18982] getname_flags+0xb8/0x3d0 [ 754.600288][T18982] getname+0x15/0x20 [ 754.604223][T18982] do_sys_openat2+0x5b/0x240 [ 754.608847][T18982] __x64_sys_open+0xe2/0x110 [ 754.613472][T18982] do_syscall_64+0x39/0x80 [ 754.617875][T18982] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 754.623787][T18982] RIP: 0033:0x417d11 [ 754.627662][T18982] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 754.647292][T18982] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 754.655685][T18982] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417d11 [ 754.663640][T18982] RDX: 000000000000001d RSI: 0000000000000002 RDI: 00007feefa74cad0 [ 754.671591][T18982] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 754.679541][T18982] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000003 [ 754.687494][T18982] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 10:59:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000ca004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:06 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 754.712921][T18967] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 754.728216][T18972] EXT4-fs (loop2): Test dummy encryption mode enabled [ 754.748672][T18972] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 754.774953][T18986] loop3: detected capacity change from 512 to 0 [ 754.792886][T18987] loop0: detected capacity change from 512 to 0 [ 754.802037][T18972] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 754.802084][T18987] EXT4-fs (loop0): Test dummy encryption mode enabled [ 754.830084][T18986] EXT4-fs (loop3): Test dummy encryption mode enabled 10:59:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002a00000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 754.867268][T18987] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 754.892459][T18972] EXT4-fs (loop2): get root inode failed [ 754.898345][T18986] EXT4-fs (loop3): inodes count not valid: 66060320 vs 32 [ 754.912794][T18972] EXT4-fs (loop2): mount failed [ 754.914414][T18999] FAULT_INJECTION: forcing a failure. [ 754.914414][T18999] name failslab, interval 1, probability 0, space 0, times 0 [ 754.936050][T18999] CPU: 0 PID: 18999 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 754.944825][T18999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.954918][T18999] Call Trace: [ 754.958301][T18999] dump_stack+0x116/0x15d [ 754.962668][T18999] should_fail+0x231/0x240 [ 754.967157][T18999] ? __alloc_file+0x2e/0x1a0 [ 754.971739][T18999] __should_failslab+0x81/0x90 [ 754.976484][T18999] should_failslab+0x5/0x20 [ 754.980963][T18999] kmem_cache_alloc+0x36/0x2e0 [ 754.985718][T18999] __alloc_file+0x2e/0x1a0 [ 754.990201][T18999] alloc_empty_file+0xcd/0x1c0 [ 754.995040][T18999] path_openat+0x6a/0x20a0 [ 754.999485][T18999] ? balance_dirty_pages_ratelimited+0xce/0x8b0 [ 755.005722][T18999] ? generic_perform_write+0x332/0x3a0 [ 755.011162][T18999] do_filp_open+0xbd/0x1d0 [ 755.015597][T18999] ? expand_files+0x55/0x500 [ 755.020343][T18999] ? __virt_addr_valid+0x15a/0x1a0 [ 755.025493][T18999] ? __check_object_size+0x253/0x310 [ 755.030832][T18999] ? _raw_spin_unlock+0x22/0x40 [ 755.035774][T18999] ? alloc_fd+0x35d/0x3b0 [ 755.040095][T18999] do_sys_openat2+0xa3/0x240 [ 755.044667][T18999] __x64_sys_open+0xe2/0x110 [ 755.049259][T18999] do_syscall_64+0x39/0x80 [ 755.053660][T18999] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 755.059532][T18999] RIP: 0033:0x417d11 [ 755.063489][T18999] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 755.083494][T18999] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 755.091935][T18999] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417d11 [ 755.099906][T18999] RDX: 000000000000001d RSI: 0000000000000002 RDI: 00007feefa74cad0 [ 755.107880][T18999] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 10:59:06 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 755.115835][T18999] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000003 [ 755.123927][T18999] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 755.181909][T18998] loop5: detected capacity change from 512 to 0 [ 755.241424][T18986] loop3: detected capacity change from 512 to 0 [ 755.258419][T19009] FAULT_INJECTION: forcing a failure. [ 755.258419][T19009] name failslab, interval 1, probability 0, space 0, times 0 [ 755.269332][T18998] EXT4-fs (loop5): Test dummy encryption mode enabled [ 755.271695][T19009] CPU: 0 PID: 19009 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 755.286951][T19009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.297056][T19009] Call Trace: [ 755.300343][T19009] dump_stack+0x116/0x15d [ 755.304662][T19009] should_fail+0x231/0x240 [ 755.309098][T19009] ? security_file_alloc+0x2e/0x190 [ 755.314289][T19009] __should_failslab+0x81/0x90 [ 755.319036][T19009] should_failslab+0x5/0x20 [ 755.323550][T19009] kmem_cache_alloc+0x36/0x2e0 [ 755.328299][T19009] ? __alloc_file+0x2e/0x1a0 [ 755.332934][T19009] security_file_alloc+0x2e/0x190 [ 755.337944][T19009] __alloc_file+0x83/0x1a0 [ 755.342355][T19009] alloc_empty_file+0xcd/0x1c0 [ 755.347115][T19009] path_openat+0x6a/0x20a0 [ 755.351514][T19009] ? balance_dirty_pages_ratelimited+0xce/0x8b0 [ 755.357740][T19009] ? generic_perform_write+0x332/0x3a0 [ 755.363380][T19009] do_filp_open+0xbd/0x1d0 [ 755.367776][T19009] ? expand_files+0x55/0x500 [ 755.372371][T19009] ? __virt_addr_valid+0x15a/0x1a0 [ 755.377466][T19009] ? __check_object_size+0x253/0x310 [ 755.382816][T19009] ? _raw_spin_unlock+0x22/0x40 [ 755.387647][T19009] ? alloc_fd+0x35d/0x3b0 [ 755.392085][T19009] do_sys_openat2+0xa3/0x240 [ 755.396709][T19009] __x64_sys_open+0xe2/0x110 [ 755.401303][T19009] do_syscall_64+0x39/0x80 [ 755.405710][T19009] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 755.411588][T19009] RIP: 0033:0x417d11 [ 755.415496][T19009] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 755.435121][T19009] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 10:59:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000056000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 755.443592][T19009] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417d11 [ 755.451547][T19009] RDX: 000000000000001d RSI: 0000000000000002 RDI: 00007feefa74cad0 [ 755.459505][T19009] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 755.467548][T19009] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000003 [ 755.475701][T19009] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 10:59:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000020000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:07 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 755.517611][T18998] EXT4-fs (loop5): inodes count not valid: 13238304 vs 32 [ 755.616730][T19011] loop4: detected capacity change from 512 to 0 10:59:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f8034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 755.688081][T19015] loop2: detected capacity change from 512 to 0 [ 755.712090][T19022] FAULT_INJECTION: forcing a failure. [ 755.712090][T19022] name failslab, interval 1, probability 0, space 0, times 0 [ 755.727536][T19022] CPU: 0 PID: 19022 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 755.736410][T19022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.746474][T19022] Call Trace: [ 755.749770][T19022] dump_stack+0x116/0x15d [ 755.754084][T19022] should_fail+0x231/0x240 [ 755.758479][T19022] __should_failslab+0x81/0x90 [ 755.763410][T19022] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 755.769113][T19022] should_failslab+0x5/0x20 [ 755.773594][T19022] __kmalloc+0x59/0x360 [ 755.777801][T19022] ? __alloc_pages_nodemask+0x19e/0x350 [ 755.783426][T19022] tomoyo_realpath_from_path+0x98/0x3b0 [ 755.788955][T19022] tomoyo_check_open_permission+0xaf/0x370 [ 755.794769][T19022] tomoyo_file_open+0xd3/0xf0 [ 755.799466][T19022] security_file_open+0x3f/0x90 [ 755.804300][T19022] do_dentry_open+0x22d/0x870 [ 755.809028][T19022] vfs_open+0x43/0x50 [ 755.813051][T19022] path_openat+0x1844/0x20a0 [ 755.817703][T19022] do_filp_open+0xbd/0x1d0 [ 755.822097][T19022] ? _raw_spin_unlock+0x22/0x40 [ 755.826964][T19022] ? alloc_fd+0x35d/0x3b0 [ 755.831278][T19022] do_sys_openat2+0xa3/0x240 [ 755.835905][T19022] __x64_sys_open+0xe2/0x110 [ 755.840541][T19022] do_syscall_64+0x39/0x80 [ 755.844960][T19022] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 755.850904][T19022] RIP: 0033:0x417d11 [ 755.854774][T19022] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 755.874360][T19022] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 755.883042][T19022] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417d11 [ 755.891013][T19022] RDX: 000000000000001d RSI: 0000000000000002 RDI: 00007feefa74cad0 [ 755.898967][T19022] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 755.906936][T19022] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000003 [ 755.914909][T19022] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 755.931466][T19022] ERROR: Out of memory at tomoyo_realpath_from_path. [ 755.944282][T19022] loop1: detected capacity change from 264192 to 0 [ 755.963824][T19015] EXT4-fs (loop2): Test dummy encryption mode enabled [ 755.990662][T19011] EXT4-fs (loop4): Test dummy encryption mode enabled [ 756.002003][T19022] EXT4-fs (loop1): Test dummy encryption mode enabled [ 756.023823][T19015] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended 10:59:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200015014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 756.034154][T19011] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 756.081156][T19032] loop0: detected capacity change from 512 to 0 [ 756.096039][T19015] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 756.108721][T19034] loop3: detected capacity change from 512 to 0 [ 756.109525][T19015] EXT4-fs (loop2): get root inode failed [ 756.121143][T19032] EXT4-fs (loop0): Test dummy encryption mode enabled [ 756.122975][T19015] EXT4-fs (loop2): mount failed [ 756.135914][T19022] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 756.150812][T19034] EXT4-fs (loop3): Test dummy encryption mode enabled [ 756.161183][T19032] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 756.161359][T19034] EXT4-fs (loop3): inodes count not valid: 66584608 vs 32 10:59:07 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000006f000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 756.291805][T19045] loop5: detected capacity change from 512 to 0 [ 756.321044][T19034] loop3: detected capacity change from 512 to 0 [ 756.332276][T19034] EXT4-fs (loop3): Test dummy encryption mode enabled 10:59:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000021000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 756.349360][T19034] EXT4-fs (loop3): inodes count not valid: 66584608 vs 32 [ 756.350775][T19045] EXT4-fs (loop5): Test dummy encryption mode enabled [ 756.389088][T19045] EXT4-fs (loop5): inodes count not valid: 18153504 vs 32 [ 756.423090][T19061] FAULT_INJECTION: forcing a failure. [ 756.423090][T19061] name failslab, interval 1, probability 0, space 0, times 0 [ 756.436057][T19061] CPU: 1 PID: 19061 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 756.444816][T19061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.454915][T19061] Call Trace: [ 756.458178][T19061] dump_stack+0x116/0x15d [ 756.462551][T19061] should_fail+0x231/0x240 [ 756.467007][T19061] __should_failslab+0x81/0x90 [ 756.471808][T19061] ? tomoyo_encode2+0x1d3/0x350 [ 756.476645][T19061] should_failslab+0x5/0x20 [ 756.481211][T19061] __kmalloc+0x59/0x360 [ 756.485350][T19061] tomoyo_encode2+0x1d3/0x350 [ 756.490094][T19061] tomoyo_realpath_from_path+0x35e/0x3b0 [ 756.495715][T19061] tomoyo_check_open_permission+0xaf/0x370 [ 756.501551][T19061] tomoyo_file_open+0xd3/0xf0 [ 756.506210][T19061] security_file_open+0x3f/0x90 [ 756.511044][T19061] do_dentry_open+0x22d/0x870 [ 756.515749][T19061] vfs_open+0x43/0x50 [ 756.519972][T19061] path_openat+0x1844/0x20a0 [ 756.524554][T19061] do_filp_open+0xbd/0x1d0 [ 756.529095][T19061] ? _raw_spin_unlock+0x22/0x40 [ 756.533932][T19061] ? alloc_fd+0x35d/0x3b0 [ 756.538251][T19061] do_sys_openat2+0xa3/0x240 [ 756.542891][T19061] __x64_sys_open+0xe2/0x110 [ 756.547629][T19061] do_syscall_64+0x39/0x80 [ 756.552145][T19061] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 756.558046][T19061] RIP: 0033:0x417d11 [ 756.561934][T19061] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 756.581865][T19061] RSP: 002b:00007feefa74ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 756.590273][T19061] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417d11 [ 756.598227][T19061] RDX: 000000000000001d RSI: 0000000000000002 RDI: 00007feefa74cad0 [ 756.606240][T19061] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 756.614274][T19061] R10: 0000000000004200 R11: 0000000000000293 R12: 0000000000000003 [ 756.622225][T19061] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 756.641239][T19061] ERROR: Out of memory at tomoyo_realpath_from_path. [ 756.672330][T19056] loop2: detected capacity change from 512 to 0 [ 756.747917][T19061] loop1: detected capacity change from 264192 to 0 [ 756.772947][T19053] loop4: detected capacity change from 512 to 0 10:59:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20003c014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200002044000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 756.794443][T19062] loop0: detected capacity change from 512 to 0 [ 756.807748][T19056] EXT4-fs (loop2): Test dummy encryption mode enabled [ 756.823311][T19056] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 756.831352][T19053] EXT4-fs (loop4): Test dummy encryption mode enabled [ 756.850938][T19061] EXT4-fs (loop1): Test dummy encryption mode enabled [ 756.877158][T19062] EXT4-fs (loop0): Test dummy encryption mode enabled [ 756.898279][T19053] EXT4-fs: failed to create workqueue [ 756.898990][T19061] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 756.903846][T19053] EXT4-fs (loop4): mount failed [ 756.937815][T19056] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 756.951380][T19078] loop3: detected capacity change from 512 to 0 [ 756.958135][T19062] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 756.967905][T19085] loop5: detected capacity change from 512 to 0 [ 756.978279][T19056] EXT4-fs (loop2): get root inode failed [ 756.985882][T19078] EXT4-fs (loop3): Test dummy encryption mode enabled [ 756.994582][T19056] EXT4-fs (loop2): mount failed 10:59:08 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000027000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 757.010084][T19078] EXT4-fs (loop3): inodes count not valid: 67239968 vs 32 10:59:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003800000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 757.080036][T19085] EXT4-fs (loop5): Test dummy encryption mode enabled [ 757.087628][T19085] EXT4-fs (loop5): inodes count not valid: 20709408 vs 32 10:59:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000002000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 757.259947][T19078] loop3: detected capacity change from 512 to 0 [ 757.289383][T19085] loop5: detected capacity change from 512 to 0 [ 757.298214][T19078] EXT4-fs (loop3): Test dummy encryption mode enabled [ 757.317635][T19078] EXT4-fs (loop3): inodes count not valid: 67239968 vs 32 [ 757.328365][T19104] loop0: detected capacity change from 512 to 0 [ 757.335681][T19105] FAULT_INJECTION: forcing a failure. [ 757.335681][T19105] name failslab, interval 1, probability 0, space 0, times 0 [ 757.349648][T19105] CPU: 1 PID: 19105 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 757.358416][T19105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.368475][T19105] Call Trace: [ 757.371737][T19105] dump_stack+0x116/0x15d [ 757.376119][T19105] should_fail+0x231/0x240 [ 757.380515][T19105] __should_failslab+0x81/0x90 [ 757.385323][T19105] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 757.391093][T19105] should_failslab+0x5/0x20 [ 757.395572][T19105] __kmalloc+0x59/0x360 [ 757.399780][T19105] ? path_openat+0x1f2b/0x20a0 [ 757.404584][T19105] tomoyo_realpath_from_path+0x98/0x3b0 [ 757.410240][T19105] tomoyo_path_number_perm+0xc1/0x2d0 [ 757.415601][T19105] ? __rcu_read_unlock+0x51/0x250 [ 757.420765][T19105] tomoyo_file_ioctl+0x1c/0x20 [ 757.425542][T19105] security_file_ioctl+0x45/0x90 [ 757.430467][T19105] __se_sys_ioctl+0x48/0x140 [ 757.435102][T19105] __x64_sys_ioctl+0x3f/0x50 [ 757.439682][T19105] do_syscall_64+0x39/0x80 [ 757.444079][T19105] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 757.450179][T19105] RIP: 0033:0x45e087 [ 757.454050][T19105] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.473724][T19105] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 757.482207][T19105] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 757.490172][T19105] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 757.498229][T19105] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 757.506184][T19105] R10: 0000000000004200 R11: 0000000000000246 R12: 0000000000000003 [ 757.514142][T19105] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 757.533949][T19105] ERROR: Out of memory at tomoyo_realpath_from_path. [ 757.542710][T19085] EXT4-fs (loop5): Test dummy encryption mode enabled [ 757.552658][T19106] loop2: detected capacity change from 512 to 0 [ 757.587551][T19105] loop1: detected capacity change from 264192 to 0 [ 757.596014][T19085] EXT4-fs (loop5): inodes count not valid: 20709408 vs 32 [ 757.622625][T19103] loop4: detected capacity change from 512 to 0 [ 757.631983][T19104] EXT4-fs (loop0): Test dummy encryption mode enabled 10:59:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200006044000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200041014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 757.659236][T19106] EXT4-fs (loop2): Test dummy encryption mode enabled [ 757.671809][T19105] EXT4-fs (loop1): Test dummy encryption mode enabled [ 757.681634][T19105] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 757.694513][T19103] EXT4-fs (loop4): Test dummy encryption mode enabled 10:59:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:09 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 757.703305][T19103] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 757.717254][T19106] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 757.741237][T19104] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 757.782284][T19106] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 757.799397][T19106] EXT4-fs (loop2): get root inode failed [ 757.805615][T19106] EXT4-fs (loop2): mount failed 10:59:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000002e000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 757.960712][T19125] loop3: detected capacity change from 512 to 0 [ 757.967781][T19124] loop5: detected capacity change from 512 to 0 [ 758.014326][T19125] EXT4-fs (loop3): Test dummy encryption mode enabled [ 758.027761][T19124] EXT4-fs (loop5): Test dummy encryption mode enabled [ 758.035803][T19125] EXT4-fs (loop3): inodes count not valid: 67502112 vs 32 10:59:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000004000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 758.061493][T19124] EXT4-fs (loop5): inodes count not valid: 21037088 vs 32 [ 758.064775][T19142] loop4: detected capacity change from 512 to 0 [ 758.121477][T19144] FAULT_INJECTION: forcing a failure. [ 758.121477][T19144] name failslab, interval 1, probability 0, space 0, times 0 [ 758.134448][T19142] EXT4-fs (loop4): Test dummy encryption mode enabled [ 758.145323][T19142] EXT4-fs (loop4): inodes count not valid: 33554464 vs 32 [ 758.149020][T19144] CPU: 1 PID: 19144 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 758.161211][T19144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.171453][T19144] Call Trace: [ 758.174730][T19144] dump_stack+0x116/0x15d [ 758.179068][T19144] should_fail+0x231/0x240 [ 758.183563][T19144] __should_failslab+0x81/0x90 [ 758.188456][T19144] ? tomoyo_encode2+0x1d3/0x350 [ 758.193698][T19144] should_failslab+0x5/0x20 [ 758.198972][T19144] __kmalloc+0x59/0x360 [ 758.204156][T19144] tomoyo_encode2+0x1d3/0x350 [ 758.209792][T19144] tomoyo_realpath_from_path+0x35e/0x3b0 [ 758.216807][T19144] tomoyo_path_number_perm+0xc1/0x2d0 [ 758.223494][T19144] ? __rcu_read_unlock+0x51/0x250 [ 758.228924][T19144] tomoyo_file_ioctl+0x1c/0x20 [ 758.234551][T19144] security_file_ioctl+0x45/0x90 [ 758.240148][T19144] __se_sys_ioctl+0x48/0x140 [ 758.245445][T19144] __x64_sys_ioctl+0x3f/0x50 [ 758.250888][T19144] do_syscall_64+0x39/0x80 [ 758.256454][T19144] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.263778][T19144] RIP: 0033:0x45e087 [ 758.267681][T19144] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.289217][T19144] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 758.297617][T19144] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 758.305747][T19144] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 758.313718][T19144] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 758.321680][T19144] R10: 0000000000004200 R11: 0000000000000246 R12: 0000000000000003 [ 758.329662][T19144] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 758.343549][T19144] ERROR: Out of memory at tomoyo_realpath_from_path. [ 758.351222][T19145] loop0: detected capacity change from 512 to 0 [ 758.378990][T19125] loop3: detected capacity change from 512 to 0 [ 758.391488][T19125] EXT4-fs (loop3): Test dummy encryption mode enabled [ 758.398424][T19144] loop1: detected capacity change from 264192 to 0 [ 758.398503][T19125] EXT4-fs (loop3): inodes count not valid: 67502112 vs 32 [ 758.418583][T19144] EXT4-fs (loop1): Test dummy encryption mode enabled [ 758.425913][T19145] EXT4-fs (loop0): Test dummy encryption mode enabled [ 758.433828][T19124] loop5: detected capacity change from 512 to 0 [ 758.440827][T19144] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 758.455414][T19150] loop2: detected capacity change from 512 to 0 [ 758.468791][T19145] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 758.531234][T19150] EXT4-fs (loop2): Test dummy encryption mode enabled [ 758.538355][T19124] EXT4-fs (loop5): Test dummy encryption mode enabled [ 758.540344][T19150] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 758.562903][T19124] EXT4-fs (loop5): inodes count not valid: 21037088 vs 32 10:59:10 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200067014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 758.574284][T19150] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 758.589880][T19150] EXT4-fs (loop2): get root inode failed [ 758.609210][T19150] EXT4-fs (loop2): mount failed 10:59:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000003f000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200010044000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000005000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 758.805672][T19176] loop5: detected capacity change from 512 to 0 [ 758.851316][T19176] EXT4-fs (loop5): Test dummy encryption mode enabled [ 758.858584][T19184] loop3: detected capacity change from 512 to 0 [ 758.870349][T19185] FAULT_INJECTION: forcing a failure. [ 758.870349][T19185] name failslab, interval 1, probability 0, space 0, times 0 [ 758.876416][T19176] EXT4-fs (loop5): inodes count not valid: 23527456 vs 32 [ 758.893996][T19185] CPU: 1 PID: 19185 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 758.902957][T19185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.912996][T19185] Call Trace: [ 758.916329][T19185] dump_stack+0x116/0x15d [ 758.920839][T19185] should_fail+0x231/0x240 [ 758.925309][T19185] ? loop_set_status_from_info+0x3a0/0x3a0 [ 758.931097][T19185] __should_failslab+0x81/0x90 [ 758.935866][T19185] ? __kthread_create_on_node+0x7a/0x270 [ 758.941575][T19185] should_failslab+0x5/0x20 [ 758.946078][T19185] kmem_cache_alloc_trace+0x39/0x320 [ 758.951352][T19185] ? wake_up_q+0x46/0x80 [ 758.955596][T19185] ? loop_set_status_from_info+0x3a0/0x3a0 [ 758.961476][T19185] __kthread_create_on_node+0x7a/0x270 [ 758.966991][T19185] ? widen_string+0x3a/0x280 [ 758.971596][T19185] ? loop_set_status_from_info+0x3a0/0x3a0 [ 758.977449][T19185] kthread_create_on_node+0x72/0xa0 [ 758.982687][T19185] loop_configure+0x552/0xc20 [ 758.987389][T19185] lo_ioctl+0x540/0x11d0 [ 758.991889][T19185] ? ___cache_free+0x3c/0x2f0 [ 758.996569][T19185] ? blkdev_common_ioctl+0xa29/0x1060 [ 759.001935][T19185] ? lo_release+0x120/0x120 [ 759.006466][T19185] blkdev_ioctl+0x1d0/0x3c0 [ 759.011206][T19185] block_ioctl+0x6d/0x80 [ 759.015468][T19185] ? blkdev_iopoll+0x70/0x70 [ 759.020057][T19185] __se_sys_ioctl+0xcb/0x140 [ 759.024850][T19185] __x64_sys_ioctl+0x3f/0x50 [ 759.029537][T19185] do_syscall_64+0x39/0x80 [ 759.033936][T19185] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 759.039808][T19185] RIP: 0033:0x45e087 [ 759.043685][T19185] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.063268][T19185] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 759.071661][T19185] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 759.079702][T19185] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 759.087691][T19185] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 10:59:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000068000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 759.095651][T19185] R10: 0000000000004200 R11: 0000000000000246 R12: 0000000000000003 [ 759.103612][T19185] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 759.126308][T19186] loop4: detected capacity change from 512 to 0 [ 759.140594][T19184] EXT4-fs (loop3): Test dummy encryption mode enabled [ 759.164130][T19184] EXT4-fs (loop3): inodes count not valid: 68157472 vs 32 [ 759.180777][T19186] EXT4-fs (loop4): Test dummy encryption mode enabled [ 759.200157][T19197] loop2: detected capacity change from 512 to 0 [ 759.202008][T19186] EXT4-fs (loop4): inodes count not valid: 50331680 vs 32 10:59:10 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 759.213224][T19197] EXT4-fs (loop2): Test dummy encryption mode enabled [ 759.235944][T19176] loop5: detected capacity change from 512 to 0 [ 759.243131][T19197] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 759.268682][T19197] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 759.285972][T19197] EXT4-fs (loop2): get root inode failed [ 759.294348][T19197] EXT4-fs (loop2): mount failed [ 759.300861][T19201] loop0: detected capacity change from 512 to 0 [ 759.322944][T19176] EXT4-fs (loop5): Test dummy encryption mode enabled [ 759.330151][T19206] FAULT_INJECTION: forcing a failure. [ 759.330151][T19206] name failslab, interval 1, probability 0, space 0, times 0 [ 759.343902][T19206] CPU: 1 PID: 19206 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 759.345709][T19176] EXT4-fs (loop5): inodes count not valid: 23527456 vs 32 [ 759.352661][T19206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.352675][T19206] Call Trace: [ 759.352683][T19206] dump_stack+0x116/0x15d [ 759.352707][T19206] should_fail+0x231/0x240 [ 759.352723][T19206] ? __kernfs_new_node+0x71/0x350 [ 759.352750][T19206] __should_failslab+0x81/0x90 [ 759.352768][T19206] should_failslab+0x5/0x20 [ 759.402727][T19206] kmem_cache_alloc+0x36/0x2e0 [ 759.408526][T19206] ? __rcu_read_unlock+0x51/0x250 [ 759.414187][T19206] __kernfs_new_node+0x71/0x350 [ 759.419847][T19206] ? kvm_sched_clock_read+0x15/0x40 [ 759.425430][T19206] ? sched_clock+0xf/0x20 [ 759.431194][T19206] ? __switch_to+0x14e/0x4c0 [ 759.436805][T19206] kernfs_create_dir_ns+0x5e/0x140 [ 759.442577][T19206] internal_create_group+0x138/0x850 [ 759.448176][T19206] ? set_disk_ro+0x19e/0x1d0 [ 759.453856][T19206] sysfs_create_group+0x1b/0x20 [ 759.459285][T19206] loop_configure+0x9a2/0xc20 [ 759.464728][T19206] lo_ioctl+0x540/0x11d0 [ 759.469021][T19206] ? ___cache_free+0x3c/0x2f0 [ 759.475338][T19206] ? blkdev_common_ioctl+0xa29/0x1060 [ 759.480971][T19206] ? lo_release+0x120/0x120 [ 759.486601][T19206] blkdev_ioctl+0x1d0/0x3c0 [ 759.492176][T19206] block_ioctl+0x6d/0x80 [ 759.497630][T19206] ? blkdev_iopoll+0x70/0x70 [ 759.502767][T19206] __se_sys_ioctl+0xcb/0x140 [ 759.508707][T19206] __x64_sys_ioctl+0x3f/0x50 [ 759.514049][T19206] do_syscall_64+0x39/0x80 [ 759.519561][T19206] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 759.526883][T19206] RIP: 0033:0x45e087 [ 759.530785][T19206] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.550489][T19206] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 759.559088][T19206] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 759.567208][T19206] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 759.575219][T19206] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 759.583197][T19206] R10: 0000000000004200 R11: 0000000000000246 R12: 0000000000000003 [ 759.591183][T19206] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 759.601775][T19206] loop1: detected capacity change from 264192 to 0 [ 759.638499][T19201] EXT4-fs (loop0): Test dummy encryption mode enabled [ 759.639038][T19184] loop3: detected capacity change from 512 to 0 [ 759.666399][T19206] EXT4-fs (loop1): Test dummy encryption mode enabled 10:59:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000006000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 759.691546][T19186] loop4: detected capacity change from 512 to 0 [ 759.698728][T19201] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 759.737845][T19206] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:59:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a2014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000054000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 759.786765][T19184] EXT4-fs (loop3): Test dummy encryption mode enabled [ 759.786799][T19186] EXT4-fs (loop4): Test dummy encryption mode enabled [ 759.795827][T19184] EXT4-fs (loop3): inodes count not valid: 68157472 vs 32 [ 759.814073][T19186] EXT4-fs (loop4): inodes count not valid: 50331680 vs 32 10:59:11 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000286000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000044000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 760.021215][T19226] loop5: detected capacity change from 512 to 0 [ 760.028073][T19222] loop2: detected capacity change from 512 to 0 [ 760.131097][T19222] EXT4-fs (loop2): Test dummy encryption mode enabled [ 760.133418][T19226] EXT4-fs (loop5): Test dummy encryption mode enabled [ 760.145153][T19222] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 760.162638][T19226] EXT4-fs (loop5): inodes count not valid: 27394080 vs 32 [ 760.171229][T19222] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 760.222355][T19222] EXT4-fs (loop2): get root inode failed [ 760.229003][T19222] EXT4-fs (loop2): mount failed [ 760.243440][T19241] loop4: detected capacity change from 512 to 0 [ 760.280775][T19243] loop0: detected capacity change from 512 to 0 [ 760.288511][T19245] loop3: detected capacity change from 512 to 0 [ 760.302317][T19244] FAULT_INJECTION: forcing a failure. [ 760.302317][T19244] name failslab, interval 1, probability 0, space 0, times 0 [ 760.314956][T19244] CPU: 1 PID: 19244 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 760.323857][T19244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.333894][T19244] Call Trace: [ 760.337198][T19244] dump_stack+0x116/0x15d [ 760.341563][T19244] should_fail+0x231/0x240 [ 760.345998][T19244] ? __kernfs_new_node+0x71/0x350 [ 760.351014][T19244] __should_failslab+0x81/0x90 [ 760.355866][T19244] should_failslab+0x5/0x20 [ 760.360364][T19244] kmem_cache_alloc+0x36/0x2e0 [ 760.365113][T19244] __kernfs_new_node+0x71/0x350 [ 760.369963][T19244] ? idr_alloc_cyclic+0x249/0x2c0 [ 760.375099][T19244] ? bpf_lsm_kernfs_init_security+0x5/0x10 [ 760.380908][T19244] ? security_kernfs_init_security+0x7b/0x90 [ 760.386873][T19244] ? rb_insert_color+0x7e/0x2e0 [ 760.391721][T19244] kernfs_new_node+0x5b/0xd0 [ 760.396319][T19244] __kernfs_create_file+0x45/0x180 [ 760.401479][T19244] sysfs_add_file_mode_ns+0x1c1/0x250 [ 760.407013][T19244] internal_create_group+0x2e4/0x850 [ 760.412352][T19244] sysfs_create_group+0x1b/0x20 [ 760.417188][T19244] loop_configure+0x9a2/0xc20 [ 760.422013][T19244] lo_ioctl+0x540/0x11d0 [ 760.426242][T19244] ? ___cache_free+0x3c/0x2f0 [ 760.431234][T19244] ? blkdev_common_ioctl+0xa29/0x1060 [ 760.436595][T19244] ? lo_release+0x120/0x120 [ 760.441111][T19244] blkdev_ioctl+0x1d0/0x3c0 [ 760.445599][T19244] block_ioctl+0x6d/0x80 [ 760.449847][T19244] ? blkdev_iopoll+0x70/0x70 [ 760.454425][T19244] __se_sys_ioctl+0xcb/0x140 [ 760.459020][T19244] __x64_sys_ioctl+0x3f/0x50 [ 760.463624][T19244] do_syscall_64+0x39/0x80 [ 760.468158][T19244] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 760.474098][T19244] RIP: 0033:0x45e087 [ 760.478091][T19244] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 760.497684][T19244] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 760.506142][T19244] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 760.514239][T19244] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 760.522349][T19244] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 760.530305][T19244] R10: 0000000000004200 R11: 0000000000000246 R12: 0000000000000003 [ 760.538377][T19244] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 760.554678][T19244] loop1: detected capacity change from 264192 to 0 [ 760.571536][T19241] EXT4-fs (loop4): Test dummy encryption mode enabled [ 760.590369][T19241] EXT4-fs (loop4): inodes count not valid: 67108896 vs 32 [ 760.627013][T19244] EXT4-fs (loop1): Test dummy encryption mode enabled [ 760.639805][T19243] EXT4-fs (loop0): Test dummy encryption mode enabled [ 760.648992][T19245] EXT4-fs (loop3): Test dummy encryption mode enabled [ 760.665251][T19243] EXT4-fs (loop0): bad geometry: block count 33554496 exceeds size of device (64 blocks) [ 760.679310][T19226] loop5: detected capacity change from 512 to 0 10:59:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000054000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000007000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 760.694140][T19244] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 760.721796][T19245] EXT4-fs (loop3): inodes count not valid: 83886112 vs 32 [ 760.733416][T19226] EXT4-fs (loop5): Test dummy encryption mode enabled 10:59:12 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 760.743506][T19226] EXT4-fs (loop5): inodes count not valid: 27394080 vs 32 10:59:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000b3014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 760.954872][T19269] loop4: detected capacity change from 512 to 0 [ 760.979610][T19268] loop2: detected capacity change from 512 to 0 [ 760.997770][T19279] FAULT_INJECTION: forcing a failure. [ 760.997770][T19279] name failslab, interval 1, probability 0, space 0, times 0 [ 761.016983][T19279] CPU: 0 PID: 19279 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 761.025975][T19279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.036024][T19279] Call Trace: [ 761.039290][T19279] dump_stack+0x116/0x15d [ 761.043663][T19279] should_fail+0x231/0x240 [ 761.048148][T19279] ? __kernfs_new_node+0x71/0x350 [ 761.053183][T19279] __should_failslab+0x81/0x90 [ 761.057957][T19279] should_failslab+0x5/0x20 [ 761.062539][T19279] kmem_cache_alloc+0x36/0x2e0 [ 761.067363][T19279] __kernfs_new_node+0x71/0x350 [ 761.072243][T19279] ? rb_insert_color+0x2c9/0x2e0 [ 761.077264][T19279] ? kernfs_link_sibling+0x21c/0x230 [ 761.082576][T19279] ? security_kernfs_init_security+0x7b/0x90 [ 761.088628][T19279] ? kernfs_activate+0x2c5/0x2e0 [ 761.093706][T19279] kernfs_new_node+0x5b/0xd0 [ 761.098376][T19279] __kernfs_create_file+0x45/0x180 [ 761.103485][T19279] sysfs_add_file_mode_ns+0x1c1/0x250 [ 761.108859][T19279] internal_create_group+0x2e4/0x850 [ 761.114131][T19279] sysfs_create_group+0x1b/0x20 [ 761.119027][T19279] loop_configure+0x9a2/0xc20 [ 761.123690][T19279] lo_ioctl+0x540/0x11d0 [ 761.127949][T19279] ? ___cache_free+0x3c/0x2f0 [ 761.132609][T19279] ? blkdev_common_ioctl+0xa29/0x1060 [ 761.137963][T19279] ? lo_release+0x120/0x120 [ 761.142447][T19279] blkdev_ioctl+0x1d0/0x3c0 [ 761.146948][T19279] block_ioctl+0x6d/0x80 [ 761.151251][T19279] ? blkdev_iopoll+0x70/0x70 [ 761.155843][T19279] __se_sys_ioctl+0xcb/0x140 [ 761.160453][T19279] __x64_sys_ioctl+0x3f/0x50 [ 761.165025][T19279] do_syscall_64+0x39/0x80 [ 761.169432][T19279] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 761.175313][T19279] RIP: 0033:0x45e087 [ 761.179204][T19279] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 761.198823][T19279] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 761.207406][T19279] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 761.215380][T19279] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 761.223422][T19279] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 761.231377][T19279] R10: 0000000000004200 R11: 0000000000000246 R12: 0000000000000003 [ 761.239360][T19279] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 10:59:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000028d000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 761.259996][T19279] loop1: detected capacity change from 264192 to 0 [ 761.270651][T19268] EXT4-fs (loop2): Test dummy encryption mode enabled [ 761.277760][T19269] EXT4-fs (loop4): Test dummy encryption mode enabled 10:59:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000064000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 761.297099][T19268] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 761.311930][T19269] EXT4-fs (loop4): inodes count not valid: 83886112 vs 32 [ 761.341379][T19277] loop5: detected capacity change from 512 to 0 [ 761.348250][T19279] EXT4-fs (loop1): Test dummy encryption mode enabled [ 761.350705][T19277] EXT4-fs (loop5): Test dummy encryption mode enabled [ 761.362209][T19277] EXT4-fs (loop5): inodes count not valid: 28508192 vs 32 [ 761.387505][T19279] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 761.402239][T19268] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 761.404469][T19269] loop4: detected capacity change from 512 to 0 [ 761.460742][T19268] EXT4-fs (loop2): get root inode failed [ 761.466751][T19268] EXT4-fs (loop2): mount failed [ 761.479159][T19292] loop0: detected capacity change from 512 to 0 [ 761.493758][T19293] loop3: detected capacity change from 512 to 0 [ 761.513634][T19269] EXT4-fs (loop4): Test dummy encryption mode enabled [ 761.530285][T19293] EXT4-fs (loop3): Test dummy encryption mode enabled [ 761.537888][T19293] EXT4-fs (loop3): inodes count not valid: 100663328 vs 32 [ 761.545955][T19292] EXT4-fs (loop0): Test dummy encryption mode enabled [ 761.551724][T19269] EXT4-fs (loop4): inodes count not valid: 83886112 vs 32 10:59:13 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 761.560351][T19292] EXT4-fs (loop0): bad geometry: block count 33554496 exceeds size of device (64 blocks) 10:59:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000e9014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000008000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004064000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000028e000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 761.800723][T19306] loop5: detected capacity change from 512 to 0 [ 761.840296][T19309] FAULT_INJECTION: forcing a failure. 10:59:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000064000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 761.840296][T19309] name failslab, interval 1, probability 0, space 0, times 0 [ 761.853112][T19309] CPU: 0 PID: 19309 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 761.861971][T19309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.872069][T19309] Call Trace: [ 761.875412][T19309] dump_stack+0x116/0x15d [ 761.879864][T19309] should_fail+0x231/0x240 [ 761.884275][T19309] ? __kernfs_new_node+0x71/0x350 [ 761.889300][T19309] __should_failslab+0x81/0x90 [ 761.894045][T19309] should_failslab+0x5/0x20 [ 761.898548][T19309] kmem_cache_alloc+0x36/0x2e0 [ 761.903290][T19309] __kernfs_new_node+0x71/0x350 [ 761.908124][T19309] ? rb_insert_color+0x7e/0x2e0 [ 761.912955][T19309] ? kernfs_link_sibling+0x21c/0x230 [ 761.918232][T19309] ? kernfs_activate+0x2c5/0x2e0 [ 761.923275][T19309] kernfs_new_node+0x5b/0xd0 [ 761.927850][T19309] __kernfs_create_file+0x45/0x180 [ 761.932942][T19309] sysfs_add_file_mode_ns+0x1c1/0x250 [ 761.938299][T19309] internal_create_group+0x2e4/0x850 [ 761.943585][T19309] sysfs_create_group+0x1b/0x20 [ 761.948459][T19309] loop_configure+0x9a2/0xc20 [ 761.953148][T19309] lo_ioctl+0x540/0x11d0 [ 761.957379][T19309] ? ___cache_free+0x3c/0x2f0 [ 761.962052][T19309] ? blkdev_common_ioctl+0xa29/0x1060 [ 761.967417][T19309] ? lo_release+0x120/0x120 [ 761.971898][T19309] blkdev_ioctl+0x1d0/0x3c0 [ 761.976397][T19309] block_ioctl+0x6d/0x80 [ 761.980728][T19309] ? blkdev_iopoll+0x70/0x70 [ 761.985308][T19309] __se_sys_ioctl+0xcb/0x140 [ 761.989969][T19309] __x64_sys_ioctl+0x3f/0x50 [ 761.994549][T19309] do_syscall_64+0x39/0x80 [ 761.999101][T19309] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 762.004973][T19309] RIP: 0033:0x45e087 [ 762.008874][T19309] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.028495][T19309] RSP: 002b:00007feefa74ca18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 762.036890][T19309] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e087 [ 762.044842][T19309] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 762.052795][T19309] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 762.060764][T19309] R10: 0000000000004200 R11: 0000000000000246 R12: 0000000000000003 [ 762.068714][T19309] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 762.078965][T19309] loop1: detected capacity change from 264192 to 0 [ 762.105459][T19306] EXT4-fs (loop5): Test dummy encryption mode enabled [ 762.125947][T19306] EXT4-fs (loop5): inodes count not valid: 32047136 vs 32 [ 762.127977][T19309] EXT4-fs (loop1): Test dummy encryption mode enabled [ 762.156072][T19323] loop3: detected capacity change from 512 to 0 [ 762.166261][T19309] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 762.231272][T19326] loop2: detected capacity change from 512 to 0 [ 762.243858][T19322] loop0: detected capacity change from 512 to 0 [ 762.254264][T19322] EXT4-fs (loop0): Test dummy encryption mode enabled [ 762.271148][T19322] EXT4-fs (loop0): bad geometry: block count 33554496 exceeds size of device (64 blocks) [ 762.312138][T19323] EXT4-fs (loop3): Test dummy encryption mode enabled [ 762.322220][T19326] EXT4-fs (loop2): Test dummy encryption mode enabled [ 762.329570][T19326] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 762.351185][T19323] EXT4-fs (loop3): inodes count not valid: 100925472 vs 32 10:59:14 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 762.358877][T19326] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 762.380155][T19306] loop5: detected capacity change from 512 to 0 [ 762.389477][T19326] EXT4-fs (loop2): get root inode failed [ 762.400643][T19326] EXT4-fs (loop2): mount failed [ 762.445834][T19306] EXT4-fs (loop5): Test dummy encryption mode enabled [ 762.452777][T19324] loop4: detected capacity change from 512 to 0 [ 762.491387][T19306] EXT4-fs (loop5): inodes count not valid: 32047136 vs 32 [ 762.503575][T19323] loop3: detected capacity change from 512 to 0 [ 762.529750][T19323] EXT4-fs (loop3): Test dummy encryption mode enabled [ 762.556614][T19350] FAULT_INJECTION: forcing a failure. [ 762.556614][T19350] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 762.572229][T19323] EXT4-fs (loop3): inodes count not valid: 100925472 vs 32 [ 762.575845][T19350] CPU: 0 PID: 19350 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 762.588182][T19350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.598232][T19350] Call Trace: [ 762.601510][T19350] dump_stack+0x116/0x15d [ 762.605854][T19350] should_fail+0x231/0x240 [ 762.610271][T19350] should_fail_usercopy+0x16/0x20 [ 762.615316][T19350] _copy_to_user+0x1c/0x90 [ 762.621433][T19350] simple_read_from_buffer+0xab/0x120 [ 762.626817][T19350] proc_fail_nth_read+0xf6/0x140 [ 762.632194][T19350] ? rw_verify_area+0x136/0x250 [ 762.637394][T19350] ? proc_fault_inject_write+0x200/0x200 [ 762.643279][T19350] vfs_read+0x154/0x5c0 [ 762.648593][T19350] ? __fget_light+0x219/0x260 10:59:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000407fffffff000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000009000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 762.654004][T19350] ksys_read+0xce/0x180 [ 762.659229][T19350] __x64_sys_read+0x3e/0x50 [ 762.664959][T19350] do_syscall_64+0x39/0x80 [ 762.670326][T19350] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 762.677735][T19350] RIP: 0033:0x417b11 [ 762.683414][T19350] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 10:59:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 762.703023][T19350] RSP: 002b:00007feefa74cc70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 762.711514][T19350] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000417b11 [ 762.719465][T19350] RDX: 000000000000000f RSI: 00007feefa74ccb0 RDI: 0000000000000003 [ 762.727418][T19350] RBP: 00007feefa74cca0 R08: 0000000020000248 R09: 0000000000000000 [ 762.735401][T19350] R10: 0000000000004200 R11: 0000000000000293 R12: 000000000000001d [ 762.743354][T19350] R13: 00007ffcef0171ff R14: 00007feefa74d9c0 R15: 000000000119bf8c 10:59:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000074000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f8014000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000074000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 762.980764][T19354] loop4: detected capacity change from 512 to 0 [ 763.013613][T19358] loop0: detected capacity change from 512 to 0 [ 763.027449][T19354] EXT4-fs (loop4): Test dummy encryption mode enabled [ 763.032388][T19358] EXT4-fs (loop0): Test dummy encryption mode enabled [ 763.045603][T19371] loop1: detected capacity change from 264192 to 0 [ 763.055192][T19367] loop3: detected capacity change from 512 to 0 [ 763.064962][T19358] EXT4-fs (loop0): bad geometry: block count 4294934336 exceeds size of device (64 blocks) [ 763.067444][T19354] EXT4-fs (loop4): inodes count not valid: 117440544 vs 32 [ 763.075107][T19368] loop2: detected capacity change from 512 to 0 [ 763.092269][T19370] loop5: detected capacity change from 512 to 0 [ 763.105327][T19371] EXT4-fs (loop1): Test dummy encryption mode enabled [ 763.105415][T19368] EXT4-fs (loop2): Test dummy encryption mode enabled [ 763.119673][T19367] EXT4-fs (loop3): Test dummy encryption mode enabled [ 763.129179][T19367] EXT4-fs (loop3): inodes count not valid: 117440544 vs 32 [ 763.137091][T19368] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 763.153315][T19371] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 763.155692][T19368] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 763.180350][T19368] EXT4-fs (loop2): get root inode failed [ 763.180362][T19368] EXT4-fs (loop2): mount failed 10:59:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 763.227053][T19370] EXT4-fs (loop5): Test dummy encryption mode enabled [ 763.241389][T19354] loop4: detected capacity change from 512 to 0 10:59:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000094000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000a000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000020003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 763.280010][T19370] EXT4-fs (loop5): inodes count not valid: 33030176 vs 32 [ 763.287661][T19354] EXT4-fs (loop4): Test dummy encryption mode enabled [ 763.319378][T19354] EXT4-fs (loop4): inodes count not valid: 117440544 vs 32 [ 763.362704][T19395] loop3: detected capacity change from 512 to 0 [ 763.463810][T19395] EXT4-fs (loop3): Test dummy encryption mode enabled [ 763.468042][T19392] loop1: detected capacity change from 512 to 0 [ 763.471022][T19395] EXT4-fs (loop3): inodes count not valid: 150994976 vs 32 [ 763.493202][T19401] loop0: detected capacity change from 512 to 0 10:59:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000084000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 763.542568][T19392] EXT4-fs (loop1): Test dummy encryption mode enabled [ 763.549448][T19370] loop5: detected capacity change from 512 to 0 [ 763.580234][T19401] EXT4-fs (loop0): Test dummy encryption mode enabled 10:59:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000a4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 763.637178][T19401] EXT4-fs (loop0): bad geometry: block count 131136 exceeds size of device (64 blocks) [ 763.665410][T19408] loop2: detected capacity change from 512 to 0 [ 763.674474][T19392] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:59:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 763.837346][T19408] EXT4-fs (loop2): Test dummy encryption mode enabled [ 763.845640][T19408] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended 10:59:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000030003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 763.887044][T19415] loop4: detected capacity change from 512 to 0 [ 763.921137][T19408] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated 10:59:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 763.935298][T19408] EXT4-fs (loop2): get root inode failed [ 763.948642][T19408] EXT4-fs (loop2): mount failed [ 763.969941][T19415] EXT4-fs (loop4): Test dummy encryption mode enabled 10:59:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000b000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 763.999571][T19415] EXT4-fs (loop4): inodes count not valid: 134217760 vs 32 [ 764.032133][T19429] loop3: detected capacity change from 512 to 0 [ 764.053494][T19428] loop0: detected capacity change from 512 to 0 [ 764.060479][T19430] loop5: detected capacity change from 512 to 0 [ 764.121703][T19428] EXT4-fs (loop0): Test dummy encryption mode enabled [ 764.130892][T19429] EXT4-fs (loop3): Test dummy encryption mode enabled [ 764.137986][T19428] EXT4-fs (loop0): bad geometry: block count 196672 exceeds size of device (64 blocks) [ 764.138096][T19430] EXT4-fs (loop5): Test dummy encryption mode enabled [ 764.159487][T19429] EXT4-fs (loop3): inodes count not valid: 167772192 vs 32 10:59:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000040003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20005d024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 764.171686][T19415] loop4: detected capacity change from 512 to 0 [ 764.178885][T19415] EXT4-fs (loop4): Test dummy encryption mode enabled [ 764.195387][T19415] EXT4-fs (loop4): inodes count not valid: 134217760 vs 32 [ 764.204307][T19430] EXT4-fs (loop5): inodes count not valid: 33816608 vs 32 [ 764.204323][T19441] loop2: detected capacity change from 512 to 0 10:59:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000094000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 764.404733][T19441] EXT4-fs (loop2): Test dummy encryption mode enabled [ 764.406876][T19448] loop1: detected capacity change from 264192 to 0 [ 764.412009][T19441] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 764.433156][T19448] EXT4-fs (loop1): Test dummy encryption mode enabled [ 764.446234][T19441] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 764.447074][T19429] loop3: detected capacity change from 512 to 0 [ 764.458738][T19441] EXT4-fs (loop2): get root inode failed [ 764.467224][T19448] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 764.471609][T19441] EXT4-fs (loop2): mount failed [ 764.496387][T19429] EXT4-fs (loop3): Test dummy encryption mode enabled 10:59:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000c000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 764.518502][T19429] EXT4-fs (loop3): inodes count not valid: 167772192 vs 32 [ 764.591222][T19464] loop5: detected capacity change from 512 to 0 [ 764.598442][T19467] loop0: detected capacity change from 512 to 0 10:59:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000b4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 764.655970][T19464] EXT4-fs (loop5): Test dummy encryption mode enabled [ 764.663061][T19464] EXT4-fs (loop5): inodes count not valid: 39649312 vs 32 [ 764.690719][T19468] loop4: detected capacity change from 512 to 0 [ 764.700115][T19467] EXT4-fs (loop0): Test dummy encryption mode enabled [ 764.712584][T19467] EXT4-fs (loop0): bad geometry: block count 262208 exceeds size of device (64 blocks) [ 764.760747][T19468] EXT4-fs (loop4): Test dummy encryption mode enabled [ 764.767961][T19468] EXT4-fs (loop4): inodes count not valid: 150994976 vs 32 10:59:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000050003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 764.849070][T19464] loop5: detected capacity change from 512 to 0 [ 764.883831][T19486] loop3: detected capacity change from 512 to 0 [ 764.895577][T19464] EXT4-fs (loop5): Test dummy encryption mode enabled [ 764.916839][T19464] EXT4-fs (loop5): inodes count not valid: 39649312 vs 32 [ 764.927911][T19490] loop1: detected capacity change from 264192 to 0 [ 764.937100][T19489] loop2: detected capacity change from 512 to 0 10:59:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000a4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 764.951628][T19486] EXT4-fs (loop3): Test dummy encryption mode enabled [ 764.967524][T19486] EXT4-fs (loop3): inodes count not valid: 184549408 vs 32 [ 765.000006][T19489] EXT4-fs (loop2): Test dummy encryption mode enabled [ 765.001661][T19490] EXT4-fs (loop1): Test dummy encryption mode enabled [ 765.011796][T19489] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 765.028607][T19489] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 765.041267][T19489] EXT4-fs (loop2): get root inode failed 10:59:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20009d024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 765.046954][T19489] EXT4-fs (loop2): mount failed [ 765.056391][T19490] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 765.070097][T19495] loop0: detected capacity change from 512 to 0 10:59:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000c4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 765.186184][T19495] EXT4-fs (loop0): Test dummy encryption mode enabled [ 765.202097][T19507] loop4: detected capacity change from 512 to 0 [ 765.208399][T19495] EXT4-fs (loop0): bad geometry: block count 327744 exceeds size of device (64 blocks) 10:59:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000d000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000060003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 765.285891][T19517] loop3: detected capacity change from 512 to 0 [ 765.294026][T19517] EXT4-fs (loop3): Test dummy encryption mode enabled [ 765.302874][T19507] EXT4-fs (loop4): Test dummy encryption mode enabled [ 765.340727][T19507] EXT4-fs (loop4): inodes count not valid: 167772192 vs 32 10:59:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 765.388132][T19517] EXT4-fs (loop3): inodes count not valid: 201326624 vs 32 [ 765.414842][T19525] loop0: detected capacity change from 512 to 0 10:59:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000b4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 765.441882][T19527] loop5: detected capacity change from 512 to 0 [ 765.503029][T19527] EXT4-fs (loop5): Test dummy encryption mode enabled [ 765.510258][T19527] EXT4-fs (loop5): inodes count not valid: 43843616 vs 32 [ 765.551451][T19528] loop2: detected capacity change from 512 to 0 [ 765.558513][T19525] EXT4-fs (loop0): Test dummy encryption mode enabled [ 765.566850][T19525] EXT4-fs (loop0): bad geometry: block count 393280 exceeds size of device (64 blocks) [ 765.626406][T19528] EXT4-fs (loop2): Test dummy encryption mode enabled [ 765.629413][T19517] loop3: detected capacity change from 512 to 0 [ 765.650031][T19517] EXT4-fs (loop3): Test dummy encryption mode enabled [ 765.650595][T19528] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended 10:59:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000070003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a1024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 765.699066][T19517] EXT4-fs (loop3): inodes count not valid: 201326624 vs 32 [ 765.713303][T19544] loop4: detected capacity change from 512 to 0 [ 765.742683][T19528] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 765.755477][T19528] EXT4-fs (loop2): get root inode failed [ 765.763406][T19528] EXT4-fs (loop2): mount failed 10:59:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010005, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000d4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 765.819898][T19544] EXT4-fs (loop4): Test dummy encryption mode enabled [ 765.853246][T19544] EXT4-fs (loop4): inodes count not valid: 184549408 vs 32 10:59:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000e000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 765.942378][T19555] loop0: detected capacity change from 512 to 0 [ 765.949170][T19556] loop1: detected capacity change from 264192 to 0 [ 765.958561][T19557] loop5: detected capacity change from 512 to 0 [ 765.966933][T19560] loop3: detected capacity change from 512 to 0 [ 766.010654][T19560] EXT4-fs (loop3): Test dummy encryption mode enabled [ 766.016056][T19555] EXT4-fs (loop0): Test dummy encryption mode enabled [ 766.017692][T19556] EXT4-fs (loop1): Test dummy encryption mode enabled [ 766.024428][T19557] EXT4-fs (loop5): Test dummy encryption mode enabled [ 766.038042][T19560] EXT4-fs (loop3): inodes count not valid: 218103840 vs 32 [ 766.049027][T19557] EXT4-fs (loop5): inodes count not valid: 44105760 vs 32 [ 766.057939][T19555] EXT4-fs (loop0): bad geometry: block count 458816 exceeds size of device (64 blocks) [ 766.077664][T19544] loop4: detected capacity change from 512 to 0 [ 766.086118][T19556] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 766.130444][T19575] loop2: detected capacity change from 512 to 0 [ 766.137520][T19544] EXT4-fs (loop4): Test dummy encryption mode enabled [ 766.146758][T19544] EXT4-fs (loop4): inodes count not valid: 184549408 vs 32 10:59:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000080003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 766.239906][T19575] EXT4-fs (loop2): Test dummy encryption mode enabled [ 766.247211][T19557] loop5: detected capacity change from 512 to 0 [ 766.267333][T19575] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended 10:59:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000c4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 766.305440][T19575] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 766.321387][T19575] EXT4-fs (loop2): get root inode failed [ 766.326414][T19560] loop3: detected capacity change from 512 to 0 [ 766.327168][T19575] EXT4-fs (loop2): mount failed 10:59:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000c3024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 766.350097][T19557] EXT4-fs (loop5): Test dummy encryption mode enabled [ 766.364233][T19557] EXT4-fs (loop5): inodes count not valid: 44105760 vs 32 10:59:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010006, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 766.399239][T19592] loop0: detected capacity change from 512 to 0 10:59:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000000f000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000e4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 766.471883][T19592] EXT4-fs (loop0): Test dummy encryption mode enabled [ 766.487167][T19592] EXT4-fs (loop0): bad geometry: block count 524352 exceeds size of device (64 blocks) [ 766.524823][T19596] loop5: detected capacity change from 512 to 0 [ 766.660108][T19598] loop4: detected capacity change from 512 to 0 [ 766.685997][T19596] EXT4-fs (loop5): Test dummy encryption mode enabled [ 766.695894][T19596] EXT4-fs (loop5): inodes count not valid: 46333984 vs 32 [ 766.695903][T19608] loop1: detected capacity change from 264192 to 0 [ 766.712611][T19606] loop3: detected capacity change from 512 to 0 [ 766.723651][T19608] EXT4-fs (loop1): Test dummy encryption mode enabled [ 766.736393][T19618] loop2: detected capacity change from 512 to 0 [ 766.743492][T19606] EXT4-fs (loop3): Test dummy encryption mode enabled [ 766.745073][T19598] EXT4-fs (loop4): Test dummy encryption mode enabled 10:59:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000090003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 766.758402][T19598] EXT4-fs (loop4): inodes count not valid: 201326624 vs 32 [ 766.768316][T19606] EXT4-fs (loop3): inodes count not valid: 234881056 vs 32 [ 766.771988][T19608] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 766.820888][T19596] loop5: detected capacity change from 512 to 0 [ 766.828893][T19596] EXT4-fs (loop5): Test dummy encryption mode enabled [ 766.829113][T19618] EXT4-fs (loop2): Test dummy encryption mode enabled [ 766.843447][T19596] EXT4-fs (loop5): inodes count not valid: 46333984 vs 32 [ 766.853992][T19618] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 766.869080][T19618] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 766.884629][T19618] EXT4-fs (loop2): get root inode failed [ 766.894644][T19618] EXT4-fs (loop2): mount failed 10:59:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010007, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 766.930767][T19631] loop0: detected capacity change from 512 to 0 [ 766.949782][T19606] loop3: detected capacity change from 512 to 0 [ 766.983506][T19598] loop4: detected capacity change from 512 to 0 10:59:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000ec024000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 767.059933][T19606] EXT4-fs (loop3): Test dummy encryption mode enabled [ 767.060903][T19631] EXT4-fs (loop0): Test dummy encryption mode enabled [ 767.073592][T19606] EXT4-fs (loop3): inodes count not valid: 234881056 vs 32 [ 767.082921][T19631] EXT4-fs (loop0): bad geometry: block count 589888 exceeds size of device (64 blocks) 10:59:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000f4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 767.119976][T19598] EXT4-fs (loop4): Test dummy encryption mode enabled [ 767.129516][T19598] EXT4-fs (loop4): inodes count not valid: 201326624 vs 32 10:59:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000010000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000a0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000d4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 767.280398][T19650] loop1: detected capacity change from 264192 to 0 [ 767.321165][T19648] loop5: detected capacity change from 512 to 0 [ 767.364205][T19650] EXT4-fs (loop1): Test dummy encryption mode enabled [ 767.372311][T19654] loop3: detected capacity change from 512 to 0 [ 767.380354][T19648] EXT4-fs (loop5): Test dummy encryption mode enabled [ 767.393514][T19661] loop2: detected capacity change from 512 to 0 [ 767.400123][T19648] EXT4-fs (loop5): inodes count not valid: 49020960 vs 32 [ 767.400923][T19654] EXT4-fs (loop3): Test dummy encryption mode enabled [ 767.416567][T19650] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 767.426771][T19671] loop0: detected capacity change from 512 to 0 [ 767.435453][T19654] EXT4-fs (loop3): inodes count not valid: 251658272 vs 32 [ 767.445792][T19661] EXT4-fs (loop2): Test dummy encryption mode enabled 10:59:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010008, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 767.472385][T19661] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 767.488714][T19661] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 767.501004][T19661] EXT4-fs (loop2): get root inode failed [ 767.506686][T19661] EXT4-fs (loop2): mount failed [ 767.521917][T19673] loop4: detected capacity change from 512 to 0 [ 767.528807][T19671] EXT4-fs (loop0): Test dummy encryption mode enabled [ 767.538850][T19671] EXT4-fs (loop0): bad geometry: block count 655424 exceeds size of device (64 blocks) [ 767.608409][T19673] EXT4-fs (loop4): Test dummy encryption mode enabled [ 767.633736][T19673] EXT4-fs (loop4): inodes count not valid: 218103840 vs 32 10:59:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000011000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000b0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 767.669739][T19648] loop5: detected capacity change from 512 to 0 10:59:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004104000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 767.760261][T19685] loop1: detected capacity change from 264192 to 0 [ 767.767621][T19648] EXT4-fs (loop5): Test dummy encryption mode enabled [ 767.780521][T19648] EXT4-fs (loop5): inodes count not valid: 49020960 vs 32 [ 767.811648][T19690] loop2: detected capacity change from 512 to 0 [ 767.862790][T19685] EXT4-fs (loop1): Test dummy encryption mode enabled [ 767.891365][T19685] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:59:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 767.918547][T19690] EXT4-fs (loop2): Test dummy encryption mode enabled [ 767.920484][T19673] loop4: detected capacity change from 512 to 0 [ 767.935385][T19701] loop3: detected capacity change from 512 to 0 [ 767.945791][T19690] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 767.961460][T19690] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 767.973942][T19690] EXT4-fs (loop2): get root inode failed [ 767.981521][T19690] EXT4-fs (loop2): mount failed [ 767.993857][T19698] loop0: detected capacity change from 512 to 0 10:59:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000e4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 768.030460][T19701] EXT4-fs (loop3): Test dummy encryption mode enabled [ 768.038703][T19701] EXT4-fs (loop3): inodes count not valid: 268697632 vs 32 [ 768.070653][T19698] EXT4-fs (loop0): Test dummy encryption mode enabled [ 768.077729][T19698] EXT4-fs (loop0): bad geometry: block count 720960 exceeds size of device (64 blocks) 10:59:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000012000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000c0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010009, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 768.285479][T19701] loop3: detected capacity change from 512 to 0 [ 768.308229][T19719] loop5: detected capacity change from 512 to 0 [ 768.329959][T19701] EXT4-fs (loop3): Test dummy encryption mode enabled [ 768.363035][T19701] EXT4-fs (loop3): inodes count not valid: 268697632 vs 32 [ 768.374561][T19728] loop2: detected capacity change from 512 to 0 [ 768.383820][T19719] EXT4-fs (loop5): Test dummy encryption mode enabled [ 768.402954][T19719] EXT4-fs (loop5): inodes count not valid: 50331680 vs 32 [ 768.410258][T19727] loop4: detected capacity change from 512 to 0 [ 768.421443][T19733] loop0: detected capacity change from 512 to 0 [ 768.429611][T19731] loop1: detected capacity change from 264192 to 0 10:59:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020104000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 768.490071][T19731] EXT4-fs (loop1): Test dummy encryption mode enabled [ 768.495215][T19728] EXT4-fs (loop2): Test dummy encryption mode enabled [ 768.504158][T19727] EXT4-fs (loop4): Test dummy encryption mode enabled [ 768.523618][T19733] EXT4-fs (loop0): Test dummy encryption mode enabled [ 768.554346][T19727] EXT4-fs (loop4): inodes count not valid: 234881056 vs 32 [ 768.577642][T19728] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 768.577966][T19731] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:59:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200045034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 768.592163][T19733] EXT4-fs (loop0): bad geometry: block count 786496 exceeds size of device (64 blocks) [ 768.654734][T19728] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 768.670125][T19728] EXT4-fs (loop2): get root inode failed [ 768.675825][T19728] EXT4-fs (loop2): mount failed 10:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5401000a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000d0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 768.859739][T19746] loop3: detected capacity change from 512 to 0 [ 768.892150][T19746] EXT4-fs (loop3): Test dummy encryption mode enabled [ 768.902544][T19746] EXT4-fs (loop3): inodes count not valid: 270532640 vs 32 [ 768.932888][T19756] loop5: detected capacity change from 512 to 0 [ 768.943856][T19727] loop4: detected capacity change from 512 to 0 10:59:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000f4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 769.011501][T19756] EXT4-fs (loop5): Test dummy encryption mode enabled [ 769.024943][T19746] loop3: detected capacity change from 512 to 0 [ 769.051105][T19756] EXT4-fs (loop5): inodes count not valid: 54853664 vs 32 10:59:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000001a000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 769.051146][T19765] loop0: detected capacity change from 512 to 0 [ 769.069593][T19746] EXT4-fs (loop3): Test dummy encryption mode enabled [ 769.081958][T19773] loop1: detected capacity change from 264192 to 0 [ 769.090827][T19773] EXT4-fs (loop1): Test dummy encryption mode enabled [ 769.101732][T19746] EXT4-fs (loop3): inodes count not valid: 270532640 vs 32 10:59:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000114000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 769.122995][T19773] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 769.219999][T19765] EXT4-fs (loop0): Test dummy encryption mode enabled [ 769.227055][T19756] loop5: detected capacity change from 512 to 0 [ 769.237164][T19765] EXT4-fs (loop0): bad geometry: block count 852032 exceeds size of device (64 blocks) [ 769.256294][T19779] loop4: detected capacity change from 512 to 0 10:59:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20004d034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 769.286060][T19788] loop2: detected capacity change from 512 to 0 [ 769.294678][T19788] EXT4-fs (loop2): Test dummy encryption mode enabled 10:59:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000e0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000124000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 769.332500][T19779] EXT4-fs (loop4): Test dummy encryption mode enabled 10:59:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5401000b, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 769.400307][T19788] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 769.405049][T19779] EXT4-fs (loop4): inodes count not valid: 251658272 vs 32 [ 769.429583][T19801] loop0: detected capacity change from 512 to 0 [ 769.437912][T19788] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 769.452482][T19788] EXT4-fs (loop2): get root inode failed [ 769.458148][T19788] EXT4-fs (loop2): mount failed [ 769.542103][T19801] EXT4-fs (loop0): Test dummy encryption mode enabled [ 769.551878][T19801] EXT4-fs (loop0): bad geometry: block count 917568 exceeds size of device (64 blocks) [ 769.587199][T19802] loop3: detected capacity change from 512 to 0 [ 769.603042][T19797] loop5: detected capacity change from 512 to 0 10:59:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000f0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000021000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 769.703319][T19802] EXT4-fs (loop3): Test dummy encryption mode enabled [ 769.710611][T19797] EXT4-fs (loop5): Test dummy encryption mode enabled [ 769.723173][T19802] EXT4-fs (loop3): inodes count not valid: 301989920 vs 32 [ 769.734046][T19797] EXT4-fs (loop5): inodes count not valid: 55377952 vs 32 [ 769.758911][T19818] loop1: detected capacity change from 264192 to 0 [ 769.768053][T19818] EXT4-fs (loop1): Test dummy encryption mode enabled 10:59:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000104000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a5034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20006b144000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 769.845273][T19818] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 769.904230][T19828] loop2: detected capacity change from 512 to 0 [ 769.918992][T19827] loop0: detected capacity change from 512 to 0 [ 769.938961][T19832] loop4: detected capacity change from 512 to 0 10:59:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5401000c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 769.955284][T19842] loop3: detected capacity change from 512 to 0 [ 769.969126][T19828] EXT4-fs (loop2): Test dummy encryption mode enabled [ 769.976382][T19836] loop5: detected capacity change from 512 to 0 [ 769.986587][T19827] EXT4-fs (loop0): Test dummy encryption mode enabled [ 769.994295][T19828] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 770.011445][T19832] EXT4-fs (loop4): Test dummy encryption mode enabled [ 770.018750][T19836] EXT4-fs (loop5): Test dummy encryption mode enabled [ 770.026650][T19827] EXT4-fs (loop0): bad geometry: block count 983104 exceeds size of device (64 blocks) [ 770.039733][T19842] EXT4-fs (loop3): Test dummy encryption mode enabled [ 770.054481][T19832] EXT4-fs (loop4): inodes count not valid: 268435488 vs 32 [ 770.087315][T19842] EXT4-fs (loop3): inodes count not valid: 342556704 vs 32 [ 770.094644][T19828] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 770.107067][T19828] EXT4-fs (loop2): get root inode failed [ 770.112934][T19836] EXT4-fs (loop5): inodes count not valid: 61145120 vs 32 [ 770.124685][T19828] EXT4-fs (loop2): mount failed 10:59:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f0034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000100003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000027000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 770.151085][T19852] loop1: detected capacity change from 264192 to 0 [ 770.320198][T19852] EXT4-fs (loop1): Test dummy encryption mode enabled [ 770.328494][T19852] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:59:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000114000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 770.381225][T19842] loop3: detected capacity change from 512 to 0 [ 770.397626][T19842] EXT4-fs (loop3): Test dummy encryption mode enabled 10:59:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5401000d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 770.423099][T19842] EXT4-fs (loop3): inodes count not valid: 342556704 vs 32 [ 770.439842][T19867] loop0: detected capacity change from 512 to 0 [ 770.510355][T19869] loop2: detected capacity change from 512 to 0 [ 770.517147][T19870] loop5: detected capacity change from 512 to 0 [ 770.530204][T19872] loop4: detected capacity change from 512 to 0 [ 770.546138][T19872] EXT4-fs (loop4): Test dummy encryption mode enabled [ 770.549706][T19867] EXT4-fs (loop0): Test dummy encryption mode enabled [ 770.561239][T19872] EXT4-fs (loop4): inodes count not valid: 285212704 vs 32 [ 770.578276][T19867] EXT4-fs (loop0): bad geometry: block count 1048640 exceeds size of device (64 blocks) 10:59:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200001154000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 770.621096][T19884] loop1: detected capacity change from 264192 to 0 [ 770.621419][T19869] EXT4-fs (loop2): Test dummy encryption mode enabled [ 770.638589][T19870] EXT4-fs (loop5): Test dummy encryption mode enabled [ 770.645798][T19869] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 770.660975][T19870] EXT4-fs (loop5): inodes count not valid: 66060320 vs 32 [ 770.680643][T19884] EXT4-fs (loop1): Test dummy encryption mode enabled [ 770.687505][T19869] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 770.701321][T19869] EXT4-fs (loop2): get root inode failed [ 770.712950][T19869] EXT4-fs (loop2): mount failed 10:59:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000110003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 770.718670][T19884] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 770.747315][T19872] loop4: detected capacity change from 512 to 0 [ 770.758463][T19892] loop3: detected capacity change from 512 to 0 10:59:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5401000e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 770.799981][T19870] loop5: detected capacity change from 512 to 0 [ 770.821172][T19892] EXT4-fs (loop3): Test dummy encryption mode enabled [ 770.828230][T19872] EXT4-fs (loop4): Test dummy encryption mode enabled 10:59:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000002e000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 770.853816][T19870] EXT4-fs (loop5): Test dummy encryption mode enabled [ 770.861203][T19872] EXT4-fs (loop4): inodes count not valid: 285212704 vs 32 [ 770.874517][T19892] EXT4-fs (loop3): inodes count not valid: 352387104 vs 32 [ 770.882213][T19870] EXT4-fs (loop5): inodes count not valid: 66060320 vs 32 [ 770.916669][T19908] loop1: detected capacity change from 264192 to 0 [ 770.930681][T19907] loop0: detected capacity change from 512 to 0 10:59:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000124000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f8034000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 771.049303][T19908] EXT4-fs (loop1): Test dummy encryption mode enabled [ 771.049411][T19907] EXT4-fs (loop0): Test dummy encryption mode enabled [ 771.073271][T19916] loop2: detected capacity change from 512 to 0 [ 771.073500][T19907] EXT4-fs (loop0): bad geometry: block count 1114176 exceeds size of device (64 blocks) [ 771.091904][T19908] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 771.160062][T19916] EXT4-fs (loop2): Test dummy encryption mode enabled [ 771.167299][T19916] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 771.188243][T19916] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 771.204179][T19916] EXT4-fs (loop2): get root inode failed 10:59:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000184000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 771.210030][T19916] EXT4-fs (loop2): mount failed [ 771.229447][T19923] loop5: detected capacity change from 512 to 0 10:59:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5401000f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 771.280110][T19929] loop4: detected capacity change from 512 to 0 [ 771.287887][T19923] EXT4-fs (loop5): Test dummy encryption mode enabled [ 771.306541][T19923] EXT4-fs (loop5): inodes count not valid: 66584608 vs 32 [ 771.317629][T19933] loop3: detected capacity change from 512 to 0 10:59:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000120003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000056000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 771.327525][T19929] EXT4-fs (loop4): Test dummy encryption mode enabled [ 771.339548][T19933] EXT4-fs (loop3): Test dummy encryption mode enabled [ 771.348101][T19929] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 771.359305][T19933] EXT4-fs (loop3): inodes count not valid: 402653216 vs 32 10:59:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001c4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 771.497976][T19944] loop1: detected capacity change from 264192 to 0 [ 771.519947][T19945] loop0: detected capacity change from 512 to 0 [ 771.535430][T19923] loop5: detected capacity change from 512 to 0 [ 771.551260][T19948] loop2: detected capacity change from 512 to 0 [ 771.563119][T19929] loop4: detected capacity change from 512 to 0 [ 771.571751][T19944] EXT4-fs (loop1): Test dummy encryption mode enabled [ 771.584320][T19944] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 771.656380][T19923] EXT4-fs (loop5): Test dummy encryption mode enabled [ 771.663494][T19929] EXT4-fs (loop4): Test dummy encryption mode enabled [ 771.670569][T19945] EXT4-fs (loop0): Test dummy encryption mode enabled [ 771.677603][T19945] EXT4-fs (loop0): bad geometry: block count 1179712 exceeds size of device (64 blocks) [ 771.689810][T19923] EXT4-fs (loop5): inodes count not valid: 66584608 vs 32 [ 771.691529][T19948] EXT4-fs (loop2): Test dummy encryption mode enabled 10:59:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010010, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 771.698089][T19929] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 771.718741][T19948] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended 10:59:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200002044000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 771.763744][T19948] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 771.777205][T19948] EXT4-fs (loop2): get root inode failed [ 771.783258][T19948] EXT4-fs (loop2): mount failed 10:59:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000184000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000400000006f000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 771.930079][T19965] loop3: detected capacity change from 512 to 0 [ 772.056303][T19965] EXT4-fs (loop3): Test dummy encryption mode enabled [ 772.075760][T19965] EXT4-fs (loop3): inodes count not valid: 469762080 vs 32 10:59:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000180003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 772.109127][T19981] loop4: detected capacity change from 512 to 0 [ 772.150189][T19982] loop2: detected capacity change from 512 to 0 [ 772.158405][T19983] loop5: detected capacity change from 512 to 0 [ 772.169404][T19981] EXT4-fs (loop4): Test dummy encryption mode enabled [ 772.178178][T19981] EXT4-fs (loop4): inodes count not valid: 402653216 vs 32 [ 772.181310][T19980] loop1: detected capacity change from 264192 to 0 [ 772.195301][T19982] EXT4-fs (loop2): Test dummy encryption mode enabled [ 772.208383][T19965] loop3: detected capacity change from 512 to 0 [ 772.214915][T19982] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 772.232233][T19983] EXT4-fs (loop5): Test dummy encryption mode enabled [ 772.232347][T19980] EXT4-fs (loop1): Test dummy encryption mode enabled [ 772.248534][T19965] EXT4-fs (loop3): Test dummy encryption mode enabled [ 772.258319][T19983] EXT4-fs (loop5): inodes count not valid: 67239968 vs 32 [ 772.267072][T19980] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 772.280791][T19965] EXT4-fs (loop3): inodes count not valid: 469762080 vs 32 [ 772.291894][T19982] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 772.307596][T19982] EXT4-fs (loop2): get root inode failed [ 772.315348][T19982] EXT4-fs (loop2): mount failed [ 772.321866][T19999] loop0: detected capacity change from 512 to 0 10:59:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000011e4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 772.460083][T19999] EXT4-fs (loop0): Test dummy encryption mode enabled [ 772.468933][T19999] EXT4-fs (loop0): bad geometry: block count 1572928 exceeds size of device (64 blocks) 10:59:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000000420000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 772.501737][T19981] loop4: detected capacity change from 512 to 0 [ 772.509416][T19983] loop5: detected capacity change from 512 to 0 10:59:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200006044000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010011, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 772.572926][T19983] EXT4-fs (loop5): Test dummy encryption mode enabled [ 772.580355][T19983] EXT4-fs (loop5): inodes count not valid: 67239968 vs 32 [ 772.582351][T19981] EXT4-fs (loop4): Test dummy encryption mode enabled 10:59:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000210003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 772.687514][T19981] EXT4-fs (loop4): inodes count not valid: 402653216 vs 32 [ 772.716426][T20025] loop3: detected capacity change from 512 to 0 [ 772.732677][T20024] loop2: detected capacity change from 512 to 0 [ 772.743507][T20023] loop0: detected capacity change from 512 to 0 [ 772.757869][T20027] loop5: detected capacity change from 512 to 0 10:59:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000214000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 772.801116][T20025] EXT4-fs (loop3): Test dummy encryption mode enabled [ 772.813850][T20025] EXT4-fs (loop3): inodes count not valid: 503382048 vs 32 [ 772.841924][T20027] EXT4-fs (loop5): Test dummy encryption mode enabled [ 772.848922][T20023] EXT4-fs (loop0): Test dummy encryption mode enabled [ 772.859698][T20024] EXT4-fs (loop2): Test dummy encryption mode enabled [ 772.868000][T20027] EXT4-fs (loop5): inodes count not valid: 67502112 vs 32 [ 772.881187][T20024] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 772.882147][T20023] EXT4-fs (loop0): bad geometry: block count 2162752 exceeds size of device (64 blocks) [ 772.925602][T20028] loop1: detected capacity change from 264192 to 0 [ 772.938284][T20025] loop3: detected capacity change from 512 to 0 [ 772.951305][T20024] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 772.973833][T20028] EXT4-fs (loop1): Test dummy encryption mode enabled [ 772.977972][T20024] EXT4-fs (loop2): get root inode failed [ 772.989932][T20024] EXT4-fs (loop2): mount failed [ 772.995734][T20028] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. 10:59:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000250003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 773.036797][T20025] EXT4-fs (loop3): Test dummy encryption mode enabled [ 773.043937][T20043] loop4: detected capacity change from 512 to 0 [ 773.043968][T20025] EXT4-fs (loop3): inodes count not valid: 503382048 vs 32 10:59:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000080000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010012, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001f4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 773.170533][T20055] loop0: detected capacity change from 512 to 0 10:59:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200010044000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 773.320229][T20043] EXT4-fs (loop4): Test dummy encryption mode enabled [ 773.327305][T20043] EXT4-fs (loop4): inodes count not valid: 553648160 vs 32 [ 773.360096][T20055] EXT4-fs (loop0): Test dummy encryption mode enabled [ 773.367219][T20055] EXT4-fs (loop0): bad geometry: block count 2424896 exceeds size of device (64 blocks) [ 773.408575][T20060] loop2: detected capacity change from 512 to 0 [ 773.513929][T20060] EXT4-fs (loop2): Test dummy encryption mode enabled [ 773.520975][T20067] loop3: detected capacity change from 512 to 0 [ 773.521081][T20060] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 773.557111][T20060] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 773.566184][T20075] loop1: detected capacity change from 264192 to 0 [ 773.571550][T20060] EXT4-fs (loop2): get root inode failed [ 773.581906][T20060] EXT4-fs (loop2): mount failed [ 773.591596][T20067] EXT4-fs (loop3): Test dummy encryption mode enabled 10:59:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000000a0000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040002e0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 773.625535][T20067] EXT4-fs (loop3): inodes count not valid: 520093728 vs 32 [ 773.634594][T20043] loop4: detected capacity change from 512 to 0 [ 773.645437][T20081] loop5: detected capacity change from 512 to 0 [ 773.700763][T20043] EXT4-fs (loop4): Test dummy encryption mode enabled [ 773.708073][T20075] EXT4-fs (loop1): Test dummy encryption mode enabled [ 773.708674][T20081] EXT4-fs (loop5): Test dummy encryption mode enabled [ 773.715875][T20043] EXT4-fs (loop4): inodes count not valid: 553648160 vs 32 [ 773.736230][T20075] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 773.755952][T20081] EXT4-fs (loop5): inodes count not valid: 68157472 vs 32 10:59:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000254000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010013, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 773.905985][T20081] loop5: detected capacity change from 512 to 0 [ 773.923661][T20067] loop3: detected capacity change from 512 to 0 [ 773.931870][T20081] EXT4-fs (loop5): Test dummy encryption mode enabled [ 773.946343][T20081] EXT4-fs (loop5): inodes count not valid: 68157472 vs 32 [ 773.955747][T20097] loop2: detected capacity change from 512 to 0 [ 773.964789][T20092] loop0: detected capacity change from 512 to 0 [ 774.010170][T20092] EXT4-fs (loop0): Test dummy encryption mode enabled [ 774.010344][T20067] EXT4-fs (loop3): Test dummy encryption mode enabled [ 774.025926][T20092] EXT4-fs (loop0): bad geometry: block count 3014720 exceeds size of device (64 blocks) [ 774.037352][T20067] EXT4-fs (loop3): inodes count not valid: 520093728 vs 32 [ 774.045918][T20097] EXT4-fs (loop2): Test dummy encryption mode enabled 10:59:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000054000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 774.053426][T20097] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 774.074937][T20105] loop4: detected capacity change from 512 to 0 [ 774.083135][T20097] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 774.098289][T20097] EXT4-fs (loop2): get root inode failed 10:59:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000031f4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 774.107298][T20097] EXT4-fs (loop2): mount failed [ 774.123034][T20105] EXT4-fs (loop4): Test dummy encryption mode enabled [ 774.131280][T20105] EXT4-fs (loop4): inodes count not valid: 620757024 vs 32 10:59:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000310003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 774.211399][T20114] loop1: detected capacity change from 264192 to 0 10:59:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000200000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 774.394314][T20114] EXT4-fs (loop1): Test dummy encryption mode enabled [ 774.407977][T20123] loop0: detected capacity change from 512 to 0 [ 774.431099][T20114] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 774.453381][T20130] loop5: detected capacity change from 512 to 0 [ 774.463130][T20123] EXT4-fs (loop0): Test dummy encryption mode enabled [ 774.466473][T20105] loop4: detected capacity change from 512 to 0 [ 774.476336][T20123] EXT4-fs (loop0): bad geometry: block count 3211328 exceeds size of device (64 blocks) [ 774.488041][T20136] loop3: detected capacity change from 512 to 0 [ 774.497922][T20134] loop2: detected capacity change from 512 to 0 [ 774.504510][T20136] EXT4-fs (loop3): Test dummy encryption mode enabled [ 774.511592][T20130] EXT4-fs (loop5): Test dummy encryption mode enabled [ 774.530151][T20130] EXT4-fs (loop5): inodes count not valid: 83886112 vs 32 [ 774.541253][T20105] EXT4-fs (loop4): Test dummy encryption mode enabled [ 774.548328][T20105] EXT4-fs (loop4): inodes count not valid: 620757024 vs 32 [ 774.568585][T20136] EXT4-fs (loop3): inodes count not valid: 520290336 vs 32 10:59:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000002e4000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000320003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 774.650004][T20134] EXT4-fs (loop2): Test dummy encryption mode enabled [ 774.658377][T20134] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 774.686134][T20134] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated 10:59:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010014, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 774.698707][T20134] EXT4-fs (loop2): get root inode failed [ 774.714011][T20134] EXT4-fs (loop2): mount failed [ 774.758246][T20130] loop5: detected capacity change from 512 to 0 [ 774.868454][T20130] EXT4-fs (loop5): Test dummy encryption mode enabled [ 774.871609][T20136] loop3: detected capacity change from 512 to 0 [ 774.881772][T20130] EXT4-fs (loop5): inodes count not valid: 83886112 vs 32 10:59:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000210000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 774.917316][T20154] loop0: detected capacity change from 512 to 0 [ 774.928587][T20136] EXT4-fs (loop3): Test dummy encryption mode enabled [ 774.947785][T20164] loop1: detected capacity change from 264192 to 0 [ 774.957140][T20136] EXT4-fs (loop3): inodes count not valid: 520290336 vs 32 10:59:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000064000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 775.005841][T20154] EXT4-fs (loop0): Test dummy encryption mode enabled [ 775.012641][T20168] loop4: detected capacity change from 512 to 0 [ 775.027696][T20154] EXT4-fs (loop0): bad geometry: block count 3276864 exceeds size of device (64 blocks) [ 775.029864][T20164] EXT4-fs (loop1): Test dummy encryption mode enabled [ 775.048075][T20164] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 775.071303][T20168] EXT4-fs (loop4): Test dummy encryption mode enabled 10:59:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000204000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040003d0003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 775.103672][T20168] EXT4-fs (loop4): inodes count not valid: 771751968 vs 32 [ 775.113042][T20172] loop2: detected capacity change from 512 to 0 [ 775.190067][T20172] EXT4-fs (loop2): Test dummy encryption mode enabled [ 775.197585][T20172] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 775.213602][T20172] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 775.227099][T20172] EXT4-fs (loop2): get root inode failed [ 775.234134][T20172] EXT4-fs (loop2): mount failed 10:59:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200004064000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010018, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000230000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 775.381523][T20168] loop4: detected capacity change from 512 to 0 [ 775.429768][T20190] loop0: detected capacity change from 512 to 0 [ 775.438007][T20192] loop3: detected capacity change from 512 to 0 [ 775.450049][T20168] EXT4-fs (loop4): Test dummy encryption mode enabled [ 775.475496][T20168] EXT4-fs (loop4): inodes count not valid: 771751968 vs 32 [ 775.475646][T20198] loop1: detected capacity change from 264192 to 0 [ 775.493834][T20193] loop5: detected capacity change from 512 to 0 [ 775.526078][T20192] EXT4-fs (loop3): Test dummy encryption mode enabled [ 775.533534][T20190] EXT4-fs (loop0): Test dummy encryption mode enabled [ 775.546954][T20190] EXT4-fs (loop0): bad geometry: block count 3997760 exceeds size of device (64 blocks) [ 775.565069][T20198] EXT4-fs (loop1): Test dummy encryption mode enabled 10:59:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000324000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 775.569419][T20193] EXT4-fs (loop5): Test dummy encryption mode enabled [ 775.579508][T20193] EXT4-fs (loop5): inodes count not valid: 100925472 vs 32 [ 775.589407][T20192] EXT4-fs (loop3): inodes count not valid: 536870944 vs 32 [ 775.610195][T20198] EXT4-fs (loop1): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: none. [ 775.634536][T20210] loop2: detected capacity change from 512 to 0 [ 775.730113][T20210] EXT4-fs (loop2): Test dummy encryption mode enabled [ 775.738722][T20210] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1009: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 775.755198][T20210] EXT4-fs error (device loop2): ext4_fill_super:4903: inode #2: comm syz-executor.2: iget: root inode unallocated [ 775.769054][T20210] EXT4-fs (loop2): get root inode failed 10:59:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000410003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 775.776592][T20210] EXT4-fs (loop2): mount failed [ 775.782940][T20193] loop5: detected capacity change from 512 to 0 [ 775.801878][T20192] loop3: detected capacity change from 512 to 0 10:59:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000074000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 10:59:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x54010021, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 775.880958][T20192] EXT4-fs (loop3): Test dummy encryption mode enabled [ 775.889103][T20192] EXT4-fs (loop3): inodes count not valid: 536870944 vs 32 [ 775.898167][T20227] loop4: detected capacity change from 512 to 0 [ 775.960082][T20227] EXT4-fs (loop4): Test dummy encryption mode enabled [ 775.998992][T20227] EXT4-fs (loop4): inodes count not valid: 838860832 vs 32 [ 776.009224][T20209] ================================================================== [ 776.017313][T20209] BUG: KCSAN: data-race in mm_update_next_owner / page_cache_ra_unbounded [ 776.025818][T20209] [ 776.028124][T20209] write to 0xffff88802e42702c of 4 bytes by task 12041 on cpu 1: [ 776.035815][T20209] page_cache_ra_unbounded+0x484/0x4c0 [ 776.041260][T20209] force_page_cache_ra+0x226/0x260 [ 776.046355][T20209] page_cache_sync_ra+0x194/0x1c0 [ 776.051377][T20209] generic_file_buffered_read_get_pages+0x234/0xaf0 [ 776.057956][T20209] generic_file_buffered_read+0x27f/0x9a0 [ 776.063653][T20209] generic_file_read_iter+0x80/0x3d0 [ 776.068914][T20209] blkdev_read_iter+0xb3/0xc0 [ 776.073585][T20209] vfs_read+0x552/0x5c0 [ 776.077721][T20209] ksys_read+0xce/0x180 [ 776.081856][T20209] __x64_sys_read+0x3e/0x50 [ 776.086340][T20209] do_syscall_64+0x39/0x80 [ 776.090737][T20209] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 776.096609][T20209] [ 776.098911][T20209] read to 0xffff88802e42702c of 4 bytes by task 20209 on cpu 0: [ 776.106514][T20209] mm_update_next_owner+0x1d9/0x4e0 [ 776.111704][T20209] exit_mm+0x327/0x420 [ 776.115751][T20209] do_exit+0x3c8/0x1630 [ 776.119887][T20209] do_group_exit+0x16f/0x170 [ 776.124466][T20209] __do_sys_exit_group+0xb/0x10 [ 776.129559][T20209] __se_sys_exit_group+0x5/0x10 [ 776.134389][T20209] __x64_sys_exit_group+0x16/0x20 [ 776.139396][T20209] do_syscall_64+0x39/0x80 [ 776.143790][T20209] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 776.149661][T20209] [ 776.151959][T20209] Reported by Kernel Concurrency Sanitizer on: [ 776.158079][T20209] CPU: 0 PID: 20209 Comm: syz-executor.2 Not tainted 5.11.0-rc1-syzkaller #0 [ 776.166900][T20209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.176931][T20209] ================================================================== [ 776.184962][T20209] Kernel panic - not syncing: panic_on_warn set ... [ 776.191527][T20209] CPU: 0 PID: 20209 Comm: syz-executor.2 Not tainted 5.11.0-rc1-syzkaller #0 [ 776.200271][T20209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.210303][T20209] Call Trace: [ 776.213575][T20209] dump_stack+0x116/0x15d [ 776.217890][T20209] panic+0x1e7/0x5fa [ 776.221765][T20209] ? vprintk_emit+0x2e2/0x360 [ 776.226422][T20209] kcsan_report+0x67b/0x680 [ 776.230905][T20209] ? kcsan_setup_watchpoint+0x47b/0x4e0 [ 776.236427][T20209] ? mm_update_next_owner+0x1d9/0x4e0 [ 776.241780][T20209] ? exit_mm+0x327/0x420 [ 776.246008][T20209] ? do_exit+0x3c8/0x1630 [ 776.250340][T20209] ? do_group_exit+0x16f/0x170 [ 776.255097][T20209] ? __do_sys_exit_group+0xb/0x10 [ 776.260289][T20209] ? __se_sys_exit_group+0x5/0x10 [ 776.265330][T20209] ? __x64_sys_exit_group+0x16/0x20 [ 776.270515][T20209] ? do_syscall_64+0x39/0x80 [ 776.275090][T20209] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 776.281145][T20209] ? kvm_sched_clock_read+0x15/0x40 [ 776.286326][T20209] ? sched_clock+0xf/0x20 [ 776.290639][T20209] ? irqtime_account_irq+0x2d/0xa0 [ 776.295729][T20209] kcsan_setup_watchpoint+0x47b/0x4e0 [ 776.301085][T20209] mm_update_next_owner+0x1d9/0x4e0 [ 776.306283][T20209] exit_mm+0x327/0x420 [ 776.310333][T20209] ? taskstats_exit+0x334/0x730 [ 776.315182][T20209] ? acct_collect+0x367/0x3c0 [ 776.319843][T20209] do_exit+0x3c8/0x1630 [ 776.324019][T20209] ? zap_other_threads+0x1b2/0x1d0 [ 776.329132][T20209] do_group_exit+0x16f/0x170 [ 776.333705][T20209] __do_sys_exit_group+0xb/0x10 [ 776.338540][T20209] __se_sys_exit_group+0x5/0x10 [ 776.343395][T20209] __x64_sys_exit_group+0x16/0x20 [ 776.348421][T20209] do_syscall_64+0x39/0x80 [ 776.353022][T20209] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 776.358918][T20209] RIP: 0033:0x45e219 [ 776.362790][T20209] Code: Unable to access opcode bytes at RIP 0x45e1ef. [ 776.369607][T20209] RSP: 002b:00007ffdcb779538 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 776.377997][T20209] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045e219 [ 776.385947][T20209] RDX: 0000000000417b71 RSI: fffffffffffffff7 RDI: 0000000000000000 [ 776.393906][T20209] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 776.401952][T20209] R10: 00000000011a0470 R11: 0000000000000246 R12: 0000000000000000 [ 776.409905][T20209] R13: 0000000000000001 R14: 0000000000000002 R15: 0000000000000000 [ 777.493236][T20209] Shutting down cpus with NMI [ 777.498793][T20209] Kernel Offset: disabled [ 777.503102][T20209] Rebooting in 86400 seconds..