onnect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0xff000000, 0x0, 0x0) [ 758.580778][T12971] loop3: detected capacity change from 0 to 4 [ 758.604628][T12971] EXT4-fs (loop3): Test dummy encryption mode enabled [ 758.616636][T12971] EXT4-fs (loop3): Can't read superblock on 2nd try [ 758.678130][T12971] loop3: detected capacity change from 0 to 4 [ 758.692991][T12971] EXT4-fs (loop3): Test dummy encryption mode enabled [ 758.702568][T12971] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4255f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003001802300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf45c5f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 758.969073][T13004] loop3: detected capacity change from 0 to 4 11:46:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x1000000000000, 0x0, 0x0) [ 759.041418][T13004] EXT4-fs (loop3): Test dummy encryption mode enabled [ 759.078337][T13004] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4795f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 759.183045][T13004] loop3: detected capacity change from 0 to 4 [ 759.202942][T13004] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0200ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 759.233852][T13004] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003002102300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0300ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x20000000000000, 0x0, 0x0) [ 759.508672][T13047] loop3: detected capacity change from 0 to 4 [ 759.526302][T13047] EXT4-fs (loop3): Test dummy encryption mode enabled [ 759.533778][T13047] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0400ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 759.613822][T13047] loop3: detected capacity change from 0 to 4 [ 759.653673][T13047] EXT4-fs (loop3): Test dummy encryption mode enabled [ 759.705452][T13047] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0500ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003002502300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0600ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 759.928444][T13085] loop3: detected capacity change from 0 to 4 11:46:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x100000000000000, 0x0, 0x0) [ 759.971854][T13085] EXT4-fs (loop3): Test dummy encryption mode enabled [ 759.986773][T13085] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0700ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 760.051848][T13085] loop3: detected capacity change from 0 to 4 [ 760.075872][T13085] EXT4-fs (loop3): Test dummy encryption mode enabled [ 760.094540][T13085] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003002702300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0800ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 760.515772][T13128] loop3: detected capacity change from 0 to 4 11:46:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x200000000000000, 0x0, 0x0) [ 760.575420][T13128] EXT4-fs (loop3): Test dummy encryption mode enabled [ 760.591810][T13128] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0f00ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 760.679411][T13128] loop3: detected capacity change from 0 to 4 [ 760.701727][T13128] EXT4-fs (loop3): Test dummy encryption mode enabled [ 760.718552][T13128] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003002e02300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655ffe00ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0003ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 760.940486][T13163] loop3: detected capacity change from 0 to 4 11:46:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x300000000000000, 0x0, 0x0) [ 760.996984][T13163] EXT4-fs (loop3): Test dummy encryption mode enabled [ 761.023249][T13163] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655ffeffffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 761.101509][T13163] loop3: detected capacity change from 0 to 4 [ 761.119308][T13163] EXT4-fs (loop3): Test dummy encryption mode enabled [ 761.139202][T13163] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000303300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0102ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 761.532162][T13208] loop3: detected capacity change from 0 to 4 [ 761.557956][T13208] EXT4-fs (loop3): Test dummy encryption mode enabled [ 761.567781][T13208] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x400000000000000, 0x0, 0x0) 11:46:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0103ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 761.612287][T13208] loop3: detected capacity change from 0 to 4 [ 761.654398][T13208] EXT4-fs (loop3): Test dummy encryption mode enabled [ 761.666180][T13208] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0104ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000304300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0105ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 761.947525][T13246] loop3: detected capacity change from 0 to 4 [ 761.974701][T13246] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x500000000000000, 0x0, 0x0) [ 762.014585][T13246] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0106ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 762.092058][T13246] loop3: detected capacity change from 0 to 4 [ 762.111937][T13246] EXT4-fs (loop3): Test dummy encryption mode enabled [ 762.130457][T13246] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0107ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000305300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 762.468294][T13287] loop3: detected capacity change from 0 to 4 11:46:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x600000000000000, 0x0, 0x0) 11:46:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0108ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 762.510618][T13287] EXT4-fs (loop3): Test dummy encryption mode enabled [ 762.543889][T13287] EXT4-fs (loop3): Can't read superblock on 2nd try [ 762.620917][T13287] loop3: detected capacity change from 0 to 4 [ 762.645009][T13287] EXT4-fs (loop3): Test dummy encryption mode enabled [ 762.688372][T13287] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0109ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000306300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f010affff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 763.005826][T13326] loop3: detected capacity change from 0 to 4 11:46:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x700000000000000, 0x0, 0x0) 11:46:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f010bffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 763.062674][T13326] EXT4-fs (loop3): Test dummy encryption mode enabled [ 763.089126][T13326] EXT4-fs (loop3): Can't read superblock on 2nd try [ 763.162587][T13326] loop3: detected capacity change from 0 to 4 [ 763.174923][T13326] EXT4-fs (loop3): Test dummy encryption mode enabled [ 763.193683][T13326] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f010cffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000307300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 763.476118][T13362] loop3: detected capacity change from 0 to 4 [ 763.500930][T13362] EXT4-fs (loop3): Test dummy encryption mode enabled [ 763.517880][T13362] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f010dffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x800000000000000, 0x0, 0x0) [ 763.618411][T13362] loop3: detected capacity change from 0 to 4 [ 763.648303][T13362] EXT4-fs (loop3): Test dummy encryption mode enabled [ 763.672744][T13362] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000308300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f010effff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f010fffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 763.919211][T13394] loop3: detected capacity change from 0 to 4 [ 763.958786][T13394] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0110ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 763.974664][T13394] EXT4-fs (loop3): Can't read superblock on 2nd try [ 764.066013][T13394] loop3: detected capacity change from 0 to 4 [ 764.083930][T13394] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x900000000000000, 0x0, 0x0) [ 764.131511][T13394] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0111ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030a300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 764.441235][T13433] loop3: detected capacity change from 0 to 4 [ 764.489349][T13433] EXT4-fs (loop3): Test dummy encryption mode enabled [ 764.521039][T13433] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0112ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0xa00000000000000, 0x0, 0x0) [ 764.622881][T13433] loop3: detected capacity change from 0 to 4 [ 764.644586][T13433] EXT4-fs (loop3): Test dummy encryption mode enabled [ 764.671061][T13433] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0118ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030f300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0125ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 764.944361][T13475] loop3: detected capacity change from 0 to 4 [ 764.997427][T13475] EXT4-fs (loop3): Test dummy encryption mode enabled [ 765.034871][T13475] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0141ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0xb00000000000000, 0x0, 0x0) [ 765.198356][T13475] loop3: detected capacity change from 0 to 4 [ 765.227622][T13475] EXT4-fs (loop3): Test dummy encryption mode enabled [ 765.249325][T13475] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f015cffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000314300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 765.443390][T13517] loop3: detected capacity change from 0 to 4 11:46:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f01feffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 765.496579][T13517] EXT4-fs (loop3): Test dummy encryption mode enabled [ 765.532624][T13517] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0xc00000000000000, 0x0, 0x0) [ 765.597255][T13517] loop3: detected capacity change from 0 to 4 [ 765.636399][T13517] EXT4-fs (loop3): Test dummy encryption mode enabled [ 765.677715][T13517] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff5eef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000318300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x5c, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 765.949195][T13556] loop3: detected capacity change from 0 to 4 [ 765.967228][T13556] EXT4-fs (loop3): Test dummy encryption mode enabled [ 765.975982][T13556] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0xd00000000000000, 0x0, 0x0) 11:46:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x43a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 766.057931][T13556] loop3: detected capacity change from 0 to 4 [ 766.092304][T13556] EXT4-fs (loop3): Test dummy encryption mode enabled [ 766.125094][T13556] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000321300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0xc00, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 766.440393][T13598] loop3: detected capacity change from 0 to 4 11:46:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0xe00000000000000, 0x0, 0x0) 11:46:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0xfdef, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 766.497338][T13598] EXT4-fs (loop3): Test dummy encryption mode enabled [ 766.532082][T13598] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300032e300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x87ffc00, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 766.860905][T13629] loop3: detected capacity change from 0 to 4 [ 766.930519][T13629] EXT4-fs (loop3): Test dummy encryption mode enabled [ 766.947188][T13629] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0xf00000000000000, 0x0, 0x0) [ 767.053438][T13629] loop3: detected capacity change from 0 to 4 [ 767.073151][T13629] EXT4-fs (loop3): Test dummy encryption mode enabled [ 767.098006][T13629] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000364300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 767.387297][T13663] loop3: detected capacity change from 0 to 4 [ 767.443678][T13663] EXT4-fs (loop3): Test dummy encryption mode enabled [ 767.484937][T13663] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x1000000000000000, 0x0, 0x0) 11:46:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 767.582237][T13663] loop3: detected capacity change from 0 to 4 [ 767.596574][T13663] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x2001003a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 767.627601][T13663] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003020a0000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 767.874955][T13700] loop3: detected capacity change from 0 to 4 [ 767.896451][T13700] EXT4-fs (loop3): Test dummy encryption mode enabled [ 767.903936][T13700] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x1100000000000000, 0x0, 0x0) [ 767.992129][T13700] loop3: detected capacity change from 0 to 4 [ 768.012371][T13700] EXT4-fs (loop3): Test dummy encryption mode enabled [ 768.030397][T13700] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302210000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 768.311639][T13731] loop3: detected capacity change from 0 to 4 [ 768.344468][T13731] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 768.362177][T13731] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x1200000000000000, 0x0, 0x0) [ 768.438218][T13731] loop3: detected capacity change from 0 to 4 [ 768.458890][T13731] EXT4-fs (loop3): Test dummy encryption mode enabled [ 768.478202][T13731] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302230000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x7ffff000, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 768.771158][T13768] loop3: detected capacity change from 0 to 4 11:46:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x1800000000000000, 0x0, 0x0) [ 768.811616][T13768] EXT4-fs (loop3): Test dummy encryption mode enabled [ 768.834620][T13768] EXT4-fs (loop3): Can't read superblock on 2nd try [ 768.927347][T13768] loop3: detected capacity change from 0 to 4 [ 768.944710][T13768] EXT4-fs (loop3): Test dummy encryption mode enabled [ 768.974776][T13768] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302250000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 769.238767][T13797] loop3: detected capacity change from 0 to 4 [ 769.265234][T13797] EXT4-fs (loop3): Test dummy encryption mode enabled [ 769.278361][T13797] EXT4-fs (loop3): Can't read superblock on 2nd try [ 769.344229][T13797] loop3: detected capacity change from 0 to 4 [ 769.360739][T13797] EXT4-fs (loop3): Test dummy encryption mode enabled [ 769.377228][T13797] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x2000000000000000, 0x0, 0x0) 11:46:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003022b0000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 769.613748][T13822] loop3: detected capacity change from 0 to 4 [ 769.645794][T13822] EXT4-fs (loop3): Test dummy encryption mode enabled [ 769.663530][T13822] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0xfffffdef, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 769.741916][T13822] loop3: detected capacity change from 0 to 4 [ 769.774819][T13822] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 769.804309][T13822] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003022d0000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x2500000000000000, 0x0, 0x0) [ 770.014726][T13854] loop3: detected capacity change from 0 to 4 [ 770.047792][T13854] EXT4-fs (loop3): Test dummy encryption mode enabled [ 770.055345][T13854] EXT4-fs (loop3): Can't read superblock on 2nd try [ 770.124210][T13854] loop3: detected capacity change from 0 to 4 [ 770.145453][T13854] EXT4-fs (loop3): Test dummy encryption mode enabled [ 770.164231][T13854] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003022e0000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x4000000000000000, 0x0, 0x0) [ 770.420950][T13884] loop3: detected capacity change from 0 to 4 11:46:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 770.474445][T13884] EXT4-fs (loop3): Test dummy encryption mode enabled [ 770.510944][T13884] EXT4-fs (loop3): Can't read superblock on 2nd try [ 770.608892][T13884] loop3: detected capacity change from 0 to 4 [ 770.626626][T13884] EXT4-fs (loop3): Test dummy encryption mode enabled [ 770.644048][T13884] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003022f0000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x7ffffffffffffbff, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 770.873465][T13918] loop3: detected capacity change from 0 to 4 [ 770.923408][T13918] EXT4-fs (loop3): Test dummy encryption mode enabled [ 770.937949][T13918] EXT4-fs (loop3): Can't read superblock on 2nd try [ 771.041691][T13918] loop3: detected capacity change from 0 to 4 [ 771.081083][T13918] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x4100000000000000, 0x0, 0x0) [ 771.115715][T13918] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003025c0000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 771.330940][T13945] loop3: detected capacity change from 0 to 4 [ 771.368723][T13945] EXT4-fs (loop3): Test dummy encryption mode enabled [ 771.385201][T13945] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 771.473538][T13945] loop3: detected capacity change from 0 to 4 [ 771.497703][T13945] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 771.534934][T13945] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x5c00000000000000, 0x0, 0x0) 11:46:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000001000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0xfffffffffffffdef, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 771.783082][T13978] loop3: detected capacity change from 0 to 4 [ 771.845151][T13978] EXT4-fs (loop3): Test dummy encryption mode enabled [ 771.868853][T13978] EXT4-fs (loop3): Can't read superblock on 2nd try [ 771.962031][T13978] loop3: detected capacity change from 0 to 4 [ 771.983040][T13978] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x8000000000000000, 0x0, 0x0) [ 772.032503][T13978] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000002000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 772.256041][T14013] loop3: detected capacity change from 0 to 4 [ 772.297751][T14013] EXT4-fs (loop3): Test dummy encryption mode enabled [ 772.314016][T14013] EXT4-fs (loop3): Can't read superblock on 2nd try [ 772.382861][T14013] loop3: detected capacity change from 0 to 4 [ 772.405556][T14013] EXT4-fs (loop3): Test dummy encryption mode enabled [ 772.428443][T14013] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0xff00000000000000, 0x0, 0x0) 11:46:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000003000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0xffffffffffffffff, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 772.651545][T14041] loop3: detected capacity change from 0 to 4 [ 772.693169][T14041] EXT4-fs (loop3): Test dummy encryption mode enabled [ 772.718350][T14041] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 772.788419][T14041] loop3: detected capacity change from 0 to 4 [ 772.805686][T14041] EXT4-fs (loop3): Test dummy encryption mode enabled [ 772.821682][T14041] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000004000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0xffffffff00000000, 0x0, 0x0) [ 773.110213][T14074] loop3: detected capacity change from 0 to 4 [ 773.144924][T14074] EXT4-fs (loop3): Test dummy encryption mode enabled [ 773.164584][T14074] EXT4-fs (loop3): Can't read superblock on 2nd try [ 773.252890][T14074] loop3: detected capacity change from 0 to 4 [ 773.304742][T14074] EXT4-fs (loop3): Test dummy encryption mode enabled [ 773.313480][T14074] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000005000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x2) 11:46:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 773.520329][T14107] loop3: detected capacity change from 0 to 4 [ 773.582397][T14107] EXT4-fs (loop3): Test dummy encryption mode enabled [ 773.611498][T14107] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x300}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 773.727933][T14107] loop3: detected capacity change from 0 to 4 [ 773.748509][T14107] EXT4-fs (loop3): Test dummy encryption mode enabled [ 773.764329][T14107] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000006000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x402}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x3) [ 773.993587][T14143] loop3: detected capacity change from 0 to 4 [ 774.033496][T14143] EXT4-fs (loop3): Test dummy encryption mode enabled [ 774.052565][T14143] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x403}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 774.119674][T14143] loop3: detected capacity change from 0 to 4 [ 774.133185][T14143] EXT4-fs (loop3): Test dummy encryption mode enabled [ 774.155450][T14143] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000007000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x404}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x405}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x4) [ 774.439367][T14182] loop3: detected capacity change from 0 to 4 [ 774.491654][T14182] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x406}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 774.538043][T14182] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x407}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 774.634201][T14182] loop3: detected capacity change from 0 to 4 [ 774.670221][T14182] EXT4-fs (loop3): Test dummy encryption mode enabled [ 774.705841][T14182] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x408}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000008000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x409}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x5) 11:46:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 775.020181][T14229] loop3: detected capacity change from 0 to 4 [ 775.084387][T14229] EXT4-fs (loop3): Test dummy encryption mode enabled [ 775.115867][T14229] EXT4-fs (loop3): Can't read superblock on 2nd try [ 775.207219][T14229] loop3: detected capacity change from 0 to 4 [ 775.227462][T14229] EXT4-fs (loop3): Test dummy encryption mode enabled [ 775.253023][T14229] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x40a}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x6) 11:46:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000009000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x40b}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 775.635126][T14278] loop3: detected capacity change from 0 to 4 11:46:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x40c}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 775.687332][T14278] EXT4-fs (loop3): Test dummy encryption mode enabled [ 775.712987][T14278] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000a000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 775.996632][T14309] loop3: detected capacity change from 0 to 4 [ 776.025020][T14309] EXT4-fs (loop3): Test dummy encryption mode enabled [ 776.054443][T14309] EXT4-fs (loop3): Can't read superblock on 2nd try [ 776.141998][T14309] loop3: detected capacity change from 0 to 4 [ 776.153342][T14309] EXT4-fs (loop3): Test dummy encryption mode enabled [ 776.161935][T14309] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x40d}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x7) 11:46:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000b000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 776.425991][T14331] loop3: detected capacity change from 0 to 4 11:46:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x40e}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 776.466431][T14331] EXT4-fs (loop3): Test dummy encryption mode enabled [ 776.489258][T14331] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 776.580563][T14331] loop3: detected capacity change from 0 to 4 [ 776.611205][T14331] EXT4-fs (loop3): Test dummy encryption mode enabled [ 776.618652][T14331] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x40f}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x410}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000c000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x8) 11:46:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x411}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 776.845307][T14371] loop3: detected capacity change from 0 to 4 [ 776.871455][T14371] EXT4-fs (loop3): Test dummy encryption mode enabled [ 776.887634][T14371] EXT4-fs (loop3): Can't read superblock on 2nd try [ 776.969069][T14371] loop3: detected capacity change from 0 to 4 [ 776.993258][T14371] EXT4-fs (loop3): Test dummy encryption mode enabled [ 777.047217][T14371] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x412}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000d000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x9) 11:46:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 777.407555][T14410] loop3: detected capacity change from 0 to 4 11:46:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x418}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 777.459566][T14410] EXT4-fs (loop3): Test dummy encryption mode enabled [ 777.485010][T14410] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 777.561778][T14410] loop3: detected capacity change from 0 to 4 [ 777.579168][T14410] EXT4-fs (loop3): Test dummy encryption mode enabled [ 777.602650][T14410] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x425}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000e000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xa) 11:46:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x441}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 777.815041][T14449] loop3: detected capacity change from 0 to 4 [ 777.892310][T14449] EXT4-fs (loop3): Test dummy encryption mode enabled [ 777.914456][T14449] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x45c}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 777.985191][T14449] loop3: detected capacity change from 0 to 4 [ 778.000249][T14449] EXT4-fs (loop3): Test dummy encryption mode enabled [ 778.017334][T14449] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300200000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x4fe}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xb) 11:46:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 778.410601][T14489] loop3: detected capacity change from 0 to 4 11:46:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x500}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 778.464331][T14489] EXT4-fs (loop3): Test dummy encryption mode enabled [ 778.484744][T14489] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x600}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 778.550949][T14489] loop3: detected capacity change from 0 to 4 11:46:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x700}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 778.619069][T14489] EXT4-fs (loop3): Test dummy encryption mode enabled [ 778.645899][T14489] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300300000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x900}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 778.872611][T14536] loop3: detected capacity change from 0 to 4 [ 778.888000][T14536] EXT4-fs (loop3): Test dummy encryption mode enabled [ 778.895973][T14536] EXT4-fs (loop3): Can't read superblock on 2nd try [ 778.970131][T14536] loop3: detected capacity change from 0 to 4 [ 778.983264][T14536] EXT4-fs (loop3): Test dummy encryption mode enabled [ 778.993238][T14536] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xc) 11:46:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0xa00}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300400000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 779.359316][T14562] loop3: detected capacity change from 0 to 4 11:46:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0xb00}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 779.406329][T14562] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 779.450963][T14562] EXT4-fs (loop3): Can't read superblock on 2nd try [ 779.518316][T14562] loop3: detected capacity change from 0 to 4 [ 779.542731][T14562] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0xc00}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 779.588018][T14562] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300500000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xd) [ 779.818327][T14605] loop3: detected capacity change from 0 to 4 [ 779.857129][T14605] EXT4-fs (loop3): Test dummy encryption mode enabled [ 779.874838][T14605] EXT4-fs (loop3): Can't read superblock on 2nd try [ 779.940548][T14605] loop3: detected capacity change from 0 to 4 [ 779.967032][T14605] EXT4-fs (loop3): Test dummy encryption mode enabled [ 779.985680][T14605] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0xd00}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300600000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xe) 11:46:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 780.310482][T14643] loop3: detected capacity change from 0 to 4 11:46:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0xe00}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 780.371178][T14643] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 780.412215][T14643] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0xf00}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x1100}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 780.555097][T14643] loop3: detected capacity change from 0 to 4 [ 780.566885][T14643] EXT4-fs (loop3): Test dummy encryption mode enabled [ 780.594122][T14643] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x1200}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300700000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 780.786419][T14685] loop3: detected capacity change from 0 to 4 [ 780.800244][T14685] EXT4-fs (loop3): Test dummy encryption mode enabled [ 780.808706][T14685] EXT4-fs (loop3): Can't read superblock on 2nd try [ 780.901770][T14685] loop3: detected capacity change from 0 to 4 [ 780.920876][T14685] EXT4-fs (loop3): Test dummy encryption mode enabled [ 780.928299][T14685] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xf) 11:46:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x8800000}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300800000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x7fffffffffffffff}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 781.307071][T14706] loop3: detected capacity change from 0 to 4 11:46:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 781.365911][T14706] EXT4-fs (loop3): Test dummy encryption mode enabled [ 781.403190][T14706] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0xffffffffffffffff}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 781.507287][T14706] loop3: detected capacity change from 0 to 4 [ 781.538362][T14706] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x10) [ 781.570038][T14706] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x2, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300900000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x3, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 781.817254][T14755] loop3: detected capacity change from 0 to 4 [ 781.883854][T14755] EXT4-fs (loop3): Test dummy encryption mode enabled [ 781.906048][T14755] EXT4-fs (loop3): Can't read superblock on 2nd try [ 781.971204][T14755] loop3: detected capacity change from 0 to 4 [ 781.996850][T14755] EXT4-fs (loop3): Test dummy encryption mode enabled [ 782.004654][T14755] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x4, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x11) 11:46:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300a00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 782.239994][T14783] loop3: detected capacity change from 0 to 4 11:46:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x5, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 782.281138][T14783] EXT4-fs (loop3): Test dummy encryption mode enabled [ 782.308620][T14783] EXT4-fs (loop3): Can't read superblock on 2nd try [ 782.363020][T14783] loop3: detected capacity change from 0 to 4 [ 782.384027][T14783] EXT4-fs (loop3): Test dummy encryption mode enabled [ 782.399286][T14783] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x6, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300b00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x7, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 782.567347][T14816] loop3: detected capacity change from 0 to 4 [ 782.613816][T14816] EXT4-fs (loop3): Test dummy encryption mode enabled [ 782.630237][T14816] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x12) 11:46:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300c00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 782.793862][T14831] loop3: detected capacity change from 0 to 4 [ 782.824360][T14831] EXT4-fs (loop3): Test dummy encryption mode enabled [ 782.831976][T14831] EXT4-fs (loop3): Can't read superblock on 2nd try [ 782.882178][T14831] loop3: detected capacity change from 0 to 4 [ 782.900924][T14831] EXT4-fs (loop3): Test dummy encryption mode enabled [ 782.907860][T14831] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x8, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300d00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x18) [ 783.203061][T14861] loop3: detected capacity change from 0 to 4 [ 783.240677][T14861] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x9, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 783.247657][T14861] EXT4-fs (loop3): Can't read superblock on 2nd try [ 783.377266][T14861] loop3: detected capacity change from 0 to 4 [ 783.392934][T14861] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xa, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 783.421623][T14861] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300e00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xb, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x25) 11:46:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xc, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 783.675547][T14904] loop3: detected capacity change from 0 to 4 [ 783.715325][T14904] EXT4-fs (loop3): Test dummy encryption mode enabled [ 783.742515][T14904] EXT4-fs (loop3): Can't read superblock on 2nd try [ 783.803165][T14904] loop3: detected capacity change from 0 to 4 [ 783.845820][T14904] EXT4-fs (loop3): Test dummy encryption mode enabled [ 783.857697][T14904] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xd, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300f00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x41) 11:46:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 784.151111][T14944] loop3: detected capacity change from 0 to 4 11:46:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xe, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 784.221448][T14944] EXT4-fs (loop3): Test dummy encryption mode enabled [ 784.280444][T14944] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xf, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 784.333843][T14944] loop3: detected capacity change from 0 to 4 [ 784.352338][T14944] EXT4-fs (loop3): Test dummy encryption mode enabled [ 784.361577][T14944] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302301000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x10, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x5c) [ 784.483344][T14981] loop3: detected capacity change from 0 to 4 [ 784.512741][T14981] EXT4-fs (loop3): Test dummy encryption mode enabled [ 784.520236][T14981] EXT4-fs (loop3): Can't read superblock on 2nd try [ 784.582520][T14981] loop3: detected capacity change from 0 to 4 [ 784.606470][T14981] EXT4-fs (loop3): Test dummy encryption mode enabled [ 784.614156][T14981] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x11, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302301100000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x12, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x300) 11:46:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 785.096819][T15018] loop3: detected capacity change from 0 to 4 [ 785.133319][T15018] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 785.187643][T15018] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x18, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 785.286484][T15018] loop3: detected capacity change from 0 to 4 [ 785.307535][T15018] EXT4-fs (loop3): Test dummy encryption mode enabled [ 785.335601][T15018] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x25, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302301200000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x500) [ 785.541299][T15058] loop3: detected capacity change from 0 to 4 11:46:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x41, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 785.581700][T15058] EXT4-fs (loop3): Test dummy encryption mode enabled [ 785.595684][T15058] EXT4-fs (loop3): Can't read superblock on 2nd try [ 785.710868][T15058] loop3: detected capacity change from 0 to 4 [ 785.744570][T15058] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x5c, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 785.778063][T15058] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302301800000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xfe, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x600) 11:46:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 786.143038][T15098] loop3: detected capacity change from 0 to 4 [ 786.174227][T15098] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x204, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 786.201544][T15098] EXT4-fs (loop3): Can't read superblock on 2nd try [ 786.323502][T15098] loop3: detected capacity change from 0 to 4 [ 786.341250][T15098] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x300, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 786.379160][T15098] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x700) 11:46:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302302100000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x402, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 786.641561][T15144] loop3: detected capacity change from 0 to 4 11:46:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x406, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 786.691928][T15144] EXT4-fs (loop3): Test dummy encryption mode enabled [ 786.719424][T15144] EXT4-fs (loop3): Can't read superblock on 2nd try [ 786.793501][T15144] loop3: detected capacity change from 0 to 4 [ 786.817874][T15144] EXT4-fs (loop3): Test dummy encryption mode enabled [ 786.849442][T15144] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x500, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x900) 11:46:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302302200000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 787.087257][T15178] loop3: detected capacity change from 0 to 4 [ 787.117006][T15178] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 787.132221][T15178] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x600, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 787.258946][T15178] loop3: detected capacity change from 0 to 4 [ 787.305223][T15178] EXT4-fs (loop3): Test dummy encryption mode enabled [ 787.336283][T15178] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x604, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302302500000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xa00) 11:46:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x700, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 787.516273][T15218] loop3: detected capacity change from 0 to 4 [ 787.556486][T15218] EXT4-fs (loop3): Test dummy encryption mode enabled [ 787.569567][T15218] EXT4-fs (loop3): Can't read superblock on 2nd try [ 787.620273][T15218] loop3: detected capacity change from 0 to 4 [ 787.630905][T15218] EXT4-fs (loop3): Test dummy encryption mode enabled [ 787.638298][T15218] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x900, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302302e00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xa00, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 787.771857][T15250] loop3: detected capacity change from 0 to 4 [ 787.791921][T15250] EXT4-fs (loop3): Test dummy encryption mode enabled [ 787.801075][T15250] EXT4-fs (loop3): Can't read superblock on 2nd try [ 787.907886][T15250] loop3: detected capacity change from 0 to 4 [ 787.941004][T15250] EXT4-fs (loop3): Test dummy encryption mode enabled [ 787.962856][T15250] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xb00) 11:46:44 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xb00, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302304100000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xc00, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 788.295007][T15290] loop3: detected capacity change from 0 to 4 [ 788.327851][T15290] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xc00) [ 788.345400][T15290] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xd00, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 788.426873][T15290] loop3: detected capacity change from 0 to 4 [ 788.445663][T15290] EXT4-fs (loop3): Test dummy encryption mode enabled [ 788.458971][T15290] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302304800000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xe00, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 788.654008][T15326] loop3: detected capacity change from 0 to 4 [ 788.686802][T15326] EXT4-fs (loop3): Test dummy encryption mode enabled [ 788.696433][T15326] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xd00) [ 788.750803][T15326] loop3: detected capacity change from 0 to 4 [ 788.776583][T15326] EXT4-fs (loop3): Test dummy encryption mode enabled [ 788.798031][T15326] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xf00, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302304c00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x1100, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xe00) [ 789.245085][T15371] loop3: detected capacity change from 0 to 4 [ 789.272418][T15371] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x1200, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 789.292096][T15371] EXT4-fs (loop3): Can't read superblock on 2nd try [ 789.382640][T15371] loop3: detected capacity change from 0 to 4 [ 789.416892][T15371] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x1800, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 789.460060][T15371] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302305c00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xf00) 11:46:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x2000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 789.631555][T15410] loop3: detected capacity change from 0 to 4 [ 789.664088][T15410] EXT4-fs (loop3): Test dummy encryption mode enabled [ 789.677326][T15410] EXT4-fs (loop3): Can't read superblock on 2nd try [ 789.751247][T15410] loop3: detected capacity change from 0 to 4 [ 789.773521][T15410] EXT4-fs (loop3): Test dummy encryption mode enabled [ 789.791573][T15410] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x2500, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302306000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x3f00, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x1100) 11:46:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 790.213182][T15455] loop3: detected capacity change from 0 to 4 11:46:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x4000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 790.285209][T15455] EXT4-fs (loop3): Test dummy encryption mode enabled [ 790.312446][T15455] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x4100, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 790.381096][T15455] loop3: detected capacity change from 0 to 4 [ 790.396218][T15455] EXT4-fs (loop3): Test dummy encryption mode enabled [ 790.407283][T15455] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x5c00, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302306400000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x1200) [ 790.631477][T15492] loop3: detected capacity change from 0 to 4 [ 790.695281][T15492] EXT4-fs (loop3): Test dummy encryption mode enabled [ 790.704415][T15492] EXT4-fs (loop3): Can't read superblock on 2nd try [ 790.771235][T15492] loop3: detected capacity change from 0 to 4 [ 790.794439][T15492] EXT4-fs (loop3): Test dummy encryption mode enabled [ 790.819191][T15492] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xfeff, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302306800000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x1800) 11:46:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xfffe, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x40000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 791.203278][T15537] loop3: detected capacity change from 0 to 4 11:46:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x80000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 791.274563][T15537] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 791.338906][T15537] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x200000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 791.401568][T15537] loop3: detected capacity change from 0 to 4 [ 791.426536][T15537] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 791.466506][T15537] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x2000) 11:46:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302306c00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x1000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:48 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 791.962056][T15587] loop3: detected capacity change from 0 to 4 11:46:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x2000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:48 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 792.020412][T15587] EXT4-fs (loop3): Test dummy encryption mode enabled [ 792.051187][T15587] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302307400000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x2040000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:48 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x2500) [ 792.329458][T15621] loop3: detected capacity change from 0 to 4 [ 792.366367][T15621] EXT4-fs (loop3): Test dummy encryption mode enabled [ 792.381120][T15621] EXT4-fs (loop3): Can't read superblock on 2nd try [ 792.449537][T15621] loop3: detected capacity change from 0 to 4 [ 792.463277][T15621] EXT4-fs (loop3): Test dummy encryption mode enabled [ 792.472535][T15621] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x3000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:48 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302307a00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x4000) [ 792.907809][T15661] loop3: detected capacity change from 0 to 4 11:46:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 792.986028][T15661] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x4000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 793.044318][T15661] EXT4-fs (loop3): Can't read superblock on 2nd try [ 793.139042][T15661] loop3: detected capacity change from 0 to 4 [ 793.163750][T15661] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x5000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 793.203700][T15661] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x4100) 11:46:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302308900000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 793.453863][T15706] loop3: detected capacity change from 0 to 4 [ 793.471244][T15706] EXT4-fs (loop3): Test dummy encryption mode enabled [ 793.479469][T15706] EXT4-fs (loop3): Can't read superblock on 2nd try [ 793.552029][T15706] loop3: detected capacity change from 0 to 4 [ 793.572443][T15706] EXT4-fs (loop3): Test dummy encryption mode enabled [ 793.587044][T15706] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x0, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x6000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230d000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x5c00) [ 793.941146][T15745] loop3: detected capacity change from 0 to 4 11:46:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x6040000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 793.989000][T15745] EXT4-fs (loop3): Test dummy encryption mode enabled [ 794.005521][T15745] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:50 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x0, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x7000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 794.135311][T15745] loop3: detected capacity change from 0 to 4 [ 794.158946][T15745] EXT4-fs (loop3): Test dummy encryption mode enabled [ 794.206881][T15745] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:50 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x0, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230fe00000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xff00) [ 794.440766][T15786] loop3: detected capacity change from 0 to 4 [ 794.483392][T15786] EXT4-fs (loop3): Test dummy encryption mode enabled [ 794.490789][T15786] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x8000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:50 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300402000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x200000) [ 794.932716][T15819] loop3: detected capacity change from 0 to 4 11:46:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x9000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 795.002998][T15819] EXT4-fs (loop3): Test dummy encryption mode enabled [ 795.032348][T15819] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 795.125849][T15819] loop3: detected capacity change from 0 to 4 [ 795.147388][T15819] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xa000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 795.183930][T15819] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300003000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x1000000) [ 795.431290][T15863] loop3: detected capacity change from 0 to 4 [ 795.485779][T15863] EXT4-fs (loop3): Test dummy encryption mode enabled [ 795.506919][T15863] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xb000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302302f03000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x2000000) [ 795.925629][T15899] loop3: detected capacity change from 0 to 4 11:46:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xc000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 795.977756][T15899] EXT4-fs (loop3): Test dummy encryption mode enabled [ 796.011430][T15899] EXT4-fs (loop3): Can't read superblock on 2nd try [ 796.103245][T15899] loop3: detected capacity change from 0 to 4 [ 796.127451][T15899] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xd000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 796.157481][T15899] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300204000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x3000000) 11:46:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xe000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xf000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 796.965892][T15959] loop3: detected capacity change from 0 to 4 11:46:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:53 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 797.040897][T15959] EXT4-fs (loop3): Test dummy encryption mode enabled [ 797.078213][T15959] EXT4-fs (loop3): Can't read superblock on 2nd try [ 797.192880][T15959] loop3: detected capacity change from 0 to 4 [ 797.211330][T15959] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x10000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:53 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 797.251364][T15959] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x4000000) 11:46:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300604000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x11000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:53 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x5000000) 11:46:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x12000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 798.007098][T16030] loop3: detected capacity change from 0 to 4 11:46:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:54 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 798.097444][T16030] EXT4-fs (loop3): Test dummy encryption mode enabled [ 798.159964][T16030] EXT4-fs (loop3): Can't read superblock on 2nd try [ 798.240780][T16030] loop3: detected capacity change from 0 to 4 [ 798.266830][T16030] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x18000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 798.293945][T16030] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x6000000) 11:46:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302301004000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x20000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x0, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x7000000) 11:46:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x25000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 799.026042][T16101] loop3: detected capacity change from 0 to 4 11:46:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x0, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 799.097411][T16101] EXT4-fs (loop3): Test dummy encryption mode enabled [ 799.135760][T16101] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 799.265717][T16101] loop3: detected capacity change from 0 to 4 [ 799.285952][T16101] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x3f000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 799.326373][T16101] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x0, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300005000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x8000000) 11:46:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x40000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 799.689523][T16152] loop3: detected capacity change from 0 to 4 11:46:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 799.762366][T16152] EXT4-fs (loop3): Test dummy encryption mode enabled [ 799.786939][T16152] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x41000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 799.903936][T16152] loop3: detected capacity change from 0 to 4 11:46:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 799.954429][T16152] EXT4-fs (loop3): Test dummy encryption mode enabled [ 799.968793][T16152] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x5c000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300006000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300), 0x0, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x9000000) 11:46:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 800.328095][T16198] loop3: detected capacity change from 0 to 4 11:46:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300), 0x0, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 800.382362][T16198] EXT4-fs (loop3): Test dummy encryption mode enabled [ 800.408780][T16198] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xfeffffff, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 800.494102][T16198] loop3: detected capacity change from 0 to 4 [ 800.516683][T16198] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 800.569523][T16198] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300), 0x0, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300406000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xfffffffe, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xa000000) 11:46:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 800.936798][T16250] loop3: detected capacity change from 0 to 4 11:46:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x10000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 801.014851][T16250] EXT4-fs (loop3): Test dummy encryption mode enabled [ 801.045086][T16250] EXT4-fs (loop3): Can't read superblock on 2nd try [ 801.136207][T16250] loop3: detected capacity change from 0 to 4 11:46:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x80000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 801.190969][T16250] EXT4-fs (loop3): Test dummy encryption mode enabled [ 801.224963][T16250] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300007000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xb000000) [ 801.553169][T16295] loop3: detected capacity change from 0 to 4 [ 801.594810][T16295] EXT4-fs (loop3): Test dummy encryption mode enabled [ 801.614398][T16295] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x1000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 801.718981][T16295] loop3: detected capacity change from 0 to 4 [ 801.748367][T16295] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x4000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 801.802721][T16295] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xc000000) 11:46:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300009000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 802.047335][T16339] loop3: detected capacity change from 0 to 4 [ 802.073361][T16339] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x7ffffffffffff, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 802.105205][T16339] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 802.196881][T16339] loop3: detected capacity change from 0 to 4 [ 802.224425][T16339] EXT4-fs (loop3): Test dummy encryption mode enabled 11:46:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 802.254787][T16339] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x8000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000a000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xd000000) 11:46:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 802.850874][T16391] loop3: detected capacity change from 0 to 4 11:46:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x20000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 802.927754][T16391] EXT4-fs (loop3): Test dummy encryption mode enabled [ 802.978560][T16391] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000b000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x100000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 803.311599][T16424] loop3: detected capacity change from 0 to 4 [ 803.359196][T16424] EXT4-fs (loop3): Test dummy encryption mode enabled [ 803.376926][T16424] EXT4-fs (loop3): Can't read superblock on 2nd try [ 803.437007][T16424] loop3: detected capacity change from 0 to 4 [ 803.447327][T16424] EXT4-fs (loop3): Test dummy encryption mode enabled [ 803.456846][T16424] EXT4-fs (loop3): Can't read superblock on 2nd try 11:46:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:46:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) 11:46:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xe000000) 11:46:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x200000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:46:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:46:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302305b0b000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 803.791274][T16450] loop3: detected capacity change from 0 to 4 11:47:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x204000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 803.863366][T16450] EXT4-fs (loop3): Test dummy encryption mode enabled [ 803.881816][T16450] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) [ 803.957068][T16450] loop3: detected capacity change from 0 to 4 [ 803.978957][T16450] EXT4-fs (loop3): Test dummy encryption mode enabled [ 804.017194][T16450] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302305c0b000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x300000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 804.341101][T16491] loop3: detected capacity change from 0 to 4 [ 804.360027][T16491] EXT4-fs (loop3): Test dummy encryption mode enabled [ 804.367069][T16491] EXT4-fs (loop3): Can't read superblock on 2nd try [ 804.418795][T16491] loop3: detected capacity change from 0 to 4 [ 804.428552][T16491] EXT4-fs (loop3): Test dummy encryption mode enabled [ 804.435543][T16491] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xf000000) 11:47:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) 11:47:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x400000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000c000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 804.845365][T16517] loop3: detected capacity change from 0 to 4 11:47:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x500000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f0", 0x7}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300), 0x0, 0x0) [ 804.904911][T16517] EXT4-fs (loop3): Test dummy encryption mode enabled [ 804.914538][T16517] EXT4-fs (loop3): Can't read superblock on 2nd try [ 805.023089][T16517] loop3: detected capacity change from 0 to 4 [ 805.045572][T16517] EXT4-fs (loop3): Test dummy encryption mode enabled [ 805.069727][T16517] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x600000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300), 0x0, 0x0) 11:47:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000d000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 805.327188][T16556] loop3: detected capacity change from 0 to 4 [ 805.367837][T16556] EXT4-fs (loop3): Test dummy encryption mode enabled [ 805.375003][T16556] EXT4-fs (loop3): Can't read superblock on 2nd try [ 805.429959][T16556] loop3: detected capacity change from 0 to 4 [ 805.442836][T16556] EXT4-fs (loop3): Test dummy encryption mode enabled [ 805.452643][T16556] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x10000000) 11:47:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f0", 0x7}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x604000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300), 0x0, 0x0) 11:47:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000e000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 805.825719][T16577] loop3: detected capacity change from 0 to 4 11:47:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x700000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 805.902706][T16577] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) 11:47:02 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f0", 0x7}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 805.951016][T16577] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x800000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000f000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 806.241316][T16613] loop3: detected capacity change from 0 to 4 [ 806.304083][T16613] EXT4-fs (loop3): Test dummy encryption mode enabled [ 806.319890][T16613] EXT4-fs (loop3): Can't read superblock on 2nd try [ 806.379416][T16613] loop3: detected capacity change from 0 to 4 [ 806.396967][T16613] EXT4-fs (loop3): Test dummy encryption mode enabled [ 806.409196][T16613] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x11000000) 11:47:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x900000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:02 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd", 0xa}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300410000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 806.889268][T16646] loop3: detected capacity change from 0 to 4 11:47:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xa00000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 806.949945][T16646] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd", 0xa}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 806.995226][T16646] EXT4-fs (loop3): Can't read superblock on 2nd try [ 807.077568][T16646] loop3: detected capacity change from 0 to 4 [ 807.109657][T16646] EXT4-fs (loop3): Test dummy encryption mode enabled [ 807.144047][T16646] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xb00000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x12000000) 11:47:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302302010000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 807.355489][T16680] loop3: detected capacity change from 0 to 4 [ 807.386592][T16680] EXT4-fs (loop3): Test dummy encryption mode enabled [ 807.405874][T16680] EXT4-fs (loop3): Can't read superblock on 2nd try [ 807.495115][T16680] loop3: detected capacity change from 0 to 4 [ 807.530303][T16680] EXT4-fs (loop3): Test dummy encryption mode enabled [ 807.539621][T16680] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xc00000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd", 0xa}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300011000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x18000000) 11:47:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xd00000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 807.898933][T16720] loop3: detected capacity change from 0 to 4 11:47:04 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd0198", 0xc}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 807.954561][T16720] EXT4-fs (loop3): Test dummy encryption mode enabled [ 807.987116][T16720] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 808.090233][T16720] loop3: detected capacity change from 0 to 4 [ 808.114875][T16720] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xe00000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 808.140386][T16720] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:04 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd0198", 0xc}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300012000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 808.340534][ T1360] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.346946][ T1360] ieee802154 phy1 wpan1: encryption failed: -22 [ 808.469103][T16761] loop3: detected capacity change from 0 to 4 [ 808.513069][T16761] EXT4-fs (loop3): Test dummy encryption mode enabled [ 808.528508][T16761] EXT4-fs (loop3): Can't read superblock on 2nd try [ 808.605970][T16761] loop3: detected capacity change from 0 to 4 [ 808.628105][T16761] EXT4-fs (loop3): Test dummy encryption mode enabled [ 808.635111][T16761] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xf00000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x20000000) 11:47:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:04 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd0198", 0xc}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300018000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 808.864414][T16786] loop3: detected capacity change from 0 to 4 11:47:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x1000000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 808.914204][T16786] EXT4-fs (loop3): Test dummy encryption mode enabled [ 808.940197][T16786] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 809.001102][T16786] loop3: detected capacity change from 0 to 4 [ 809.031284][T16786] EXT4-fs (loop3): Test dummy encryption mode enabled [ 809.092318][T16786] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x1100000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300020000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x25000000) 11:47:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x1200000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 809.797651][T16839] loop3: detected capacity change from 0 to 4 11:47:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x1800000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 809.842492][T16839] EXT4-fs (loop3): Test dummy encryption mode enabled [ 809.874299][T16839] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 809.970494][T16839] loop3: detected capacity change from 0 to 4 [ 809.984174][T16839] EXT4-fs (loop3): Test dummy encryption mode enabled [ 810.013729][T16839] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x2000000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x40000000) 11:47:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302301020000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x2500000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 810.743426][T16892] loop3: detected capacity change from 0 to 4 11:47:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x3f00000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 810.804235][T16892] EXT4-fs (loop3): Test dummy encryption mode enabled [ 810.819280][T16892] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, 0x0, 0x2) [ 810.909771][T16892] loop3: detected capacity change from 0 to 4 [ 810.925089][T16892] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x4000000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 810.959300][T16892] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, 0x0, 0x2) 11:47:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300021000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x41000000) 11:47:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, 0x0, 0x2) 11:47:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x4100000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 811.738054][T16953] loop3: detected capacity change from 0 to 4 11:47:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x5c00000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2) [ 811.793079][T16953] EXT4-fs (loop3): Test dummy encryption mode enabled [ 811.816938][T16953] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x8000000000000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 811.934501][T16953] loop3: detected capacity change from 0 to 4 11:47:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 811.979888][T16953] EXT4-fs (loop3): Test dummy encryption mode enabled [ 812.025273][T16953] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x5c000000) 11:47:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xfeffffff00000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300022000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2) 11:47:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 812.690250][T17007] loop3: detected capacity change from 0 to 4 [ 812.748299][T17007] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2) 11:47:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 812.797326][T17007] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xfeffffffffffffff, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 812.915457][T17007] loop3: detected capacity change from 0 to 4 [ 812.941696][T17007] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xffffffff00000000, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 812.987969][T17007] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)}, 0x2) 11:47:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300025000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xff000000) 11:47:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xffffffffffff0700, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)}, 0x2) [ 813.668857][T17064] loop3: detected capacity change from 0 to 4 11:47:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xfffffffffffffffe, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 813.726986][T17064] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)}, 0x2) [ 813.772958][T17064] EXT4-fs (loop3): Can't read superblock on 2nd try [ 813.840058][T17064] loop3: detected capacity change from 0 to 4 [ 813.864247][T17064] EXT4-fs (loop3): Test dummy encryption mode enabled [ 813.876041][T17064] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0xffffffffffffffff, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230002e000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 814.163182][T17104] loop3: detected capacity change from 0 to 4 [ 814.174860][T17104] EXT4-fs (loop3): Test dummy encryption mode enabled [ 814.192132][T17104] EXT4-fs (loop3): Can't read superblock on 2nd try [ 814.242103][T17104] loop3: detected capacity change from 0 to 4 [ 814.270385][T17104] EXT4-fs (loop3): Test dummy encryption mode enabled [ 814.277372][T17104] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}, 0x2) 11:47:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x1000000000000) 11:47:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230032f000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 814.628010][T17123] loop3: detected capacity change from 0 to 4 11:47:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x2}) [ 814.685854][T17123] EXT4-fs (loop3): Test dummy encryption mode enabled [ 814.712219][T17123] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}, 0x2) [ 814.818403][T17123] loop3: detected capacity change from 0 to 4 11:47:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 814.878019][T17123] EXT4-fs (loop3): Test dummy encryption mode enabled [ 814.884973][T17123] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}, 0x2) 11:47:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x3}) 11:47:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x20000000000000) 11:47:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230003f000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x4}) 11:47:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x0) [ 815.636895][T17182] loop3: detected capacity change from 0 to 4 11:47:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x5}) 11:47:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x0) 11:47:11 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 815.699921][T17182] EXT4-fs (loop3): Test dummy encryption mode enabled [ 815.722930][T17182] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 815.797690][T17182] loop3: detected capacity change from 0 to 4 [ 815.810122][T17182] EXT4-fs (loop3): Test dummy encryption mode enabled [ 815.835899][T17182] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x6}) 11:47:12 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x100000000000000) 11:47:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x0) 11:47:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300040000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:12 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x7}) 11:47:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 816.194528][T17231] loop3: detected capacity change from 0 to 4 11:47:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x8}) [ 816.246561][T17231] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 816.291143][T17231] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 816.419076][T17231] loop3: detected capacity change from 0 to 4 11:47:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x9}) 11:47:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 816.471778][T17231] EXT4-fs (loop3): Test dummy encryption mode enabled [ 816.504175][T17231] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x200000000000000) 11:47:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300041000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0xa}) 11:47:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0xb}) 11:47:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 816.820763][T17283] loop3: detected capacity change from 0 to 4 11:47:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 816.889999][T17283] EXT4-fs (loop3): Test dummy encryption mode enabled [ 816.948159][T17283] EXT4-fs (loop3): Can't read superblock on 2nd try [ 817.017283][T17283] loop3: detected capacity change from 0 to 4 [ 817.052629][T17283] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0xc}) 11:47:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 817.119148][T17283] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x300000000000000) 11:47:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300048000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0xd}) 11:47:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 817.380241][T17332] loop3: detected capacity change from 0 to 4 11:47:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0xe}) [ 817.449967][T17332] EXT4-fs (loop3): Test dummy encryption mode enabled [ 817.480753][T17332] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x0, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 817.551235][T17332] loop3: detected capacity change from 0 to 4 [ 817.583090][T17332] EXT4-fs (loop3): Test dummy encryption mode enabled [ 817.614835][T17332] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0xf}) 11:47:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x400000000000000) 11:47:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230004c000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x0, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x10}) 11:47:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 817.935148][T17384] loop3: detected capacity change from 0 to 4 11:47:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x0, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 817.989791][T17384] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x11}) [ 818.056884][T17384] EXT4-fs (loop3): Can't read superblock on 2nd try [ 818.141527][T17384] loop3: detected capacity change from 0 to 4 [ 818.169493][T17384] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 818.212354][T17384] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x500000000000000) 11:47:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300b5b000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x12}) 11:47:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x18}) 11:47:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 818.498384][T17432] loop3: detected capacity change from 0 to 4 11:47:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 818.560143][T17432] EXT4-fs (loop3): Test dummy encryption mode enabled [ 818.592957][T17432] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 818.670262][T17432] loop3: detected capacity change from 0 to 4 11:47:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x25}) [ 818.711882][T17432] EXT4-fs (loop3): Test dummy encryption mode enabled [ 818.744108][T17432] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x600000000000000) 11:47:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230005c000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x41}) 11:47:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 819.026439][T17479] loop3: detected capacity change from 0 to 4 11:47:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0x5c}) 11:47:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 819.096777][T17479] EXT4-fs (loop3): Test dummy encryption mode enabled [ 819.149813][T17479] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 819.242310][T17479] loop3: detected capacity change from 0 to 4 [ 819.274031][T17479] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0xfe}) [ 819.314339][T17479] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300b5c000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x700000000000000) 11:47:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}], [], 0xff}) 11:47:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 819.620864][T17529] loop3: detected capacity change from 0 to 4 [ 819.665100][T17529] EXT4-fs (loop3): Test dummy encryption mode enabled [ 819.688374][T17529] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="746573745f64756d6d795f656e9e72797074696f6e2c00"]) [ 819.769936][T17529] loop3: detected capacity change from 0 to 4 11:47:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 819.816301][T17529] EXT4-fs (loop3): Test dummy encryption mode enabled [ 819.854456][T17529] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300060000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x800000000000000) 11:47:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="740100747464756d266c533d7943311f2b2a4af273ef1d"]) chdir(&(0x7f0000000040)='./file0\x00') 11:47:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 820.266446][T17579] loop3: detected capacity change from 0 to 4 [ 820.293664][T17579] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) connect$unix(r1, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e24}, 0x6e) [ 820.320879][T17579] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 820.448304][T17579] loop3: detected capacity change from 0 to 4 [ 820.473847][T17579] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 820.498539][T17579] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300064000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)={[{@jqfmt_vfsv0}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) 11:47:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x900000000000000) 11:47:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 820.781912][T17624] loop3: detected capacity change from 0 to 4 11:47:17 executing program 5: fcntl$setsig(0xffffffffffffffff, 0xa, 0xa) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 820.840573][T17624] EXT4-fs (loop3): Test dummy encryption mode enabled [ 820.871785][T17624] EXT4-fs (loop3): Can't read superblock on 2nd try [ 820.940695][T17624] loop3: detected capacity change from 0 to 4 [ 820.956514][T17624] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 821.016268][T17624] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x220000, &(0x7f0000000040)=ANY=[@ANYBLOB="746573745f64756d6d795f676e633f5cfe9355c467343e352b696f6e2c00"]) 11:47:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300068000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xa00000000000000) [ 821.304558][T17673] loop3: detected capacity change from 0 to 4 11:47:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) [ 821.384385][T17673] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:17 executing program 5: r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) sendmsg$AUDIT_LIST_RULES(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa44c80}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x3f5, 0x400, 0x70bd2b, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = memfd_create(&(0x7f0000000080)='\x00', 0x5) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) fchown(r4, r3, r6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)={[{@test_dummy_encryption}], [{@dont_measure}, {@smackfsfloor}, {@permit_directio}, {@uid_gt={'uid>', 0xee00}}, {@obj_type={'obj_type', 0x3d, 'test_dummy_encryption'}}]}) [ 821.424660][T17673] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 821.518477][T17673] loop3: detected capacity change from 0 to 4 [ 821.530429][T17673] EXT4-fs (loop3): Test dummy encryption mode enabled [ 821.563990][T17673] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) 11:47:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230006c000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = memfd_create(&(0x7f0000000080)='\x00', 0x5) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) fchown(r2, r1, r4) mount$overlay(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000140)={[{@nfs_export_on}, {@metacopy_off}, {@nfs_export_off}, {@index_off}], [{@pcr={'pcr', 0x3d, 0x38}}, {@audit}, {@subj_role={'subj_role', 0x3d, '&'}}, {@euid_eq={'euid', 0x3d, r1}}]}) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0), 0x10000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r5, 0x541b, &(0x7f00000001c0)) 11:47:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xb00000000000000) 11:47:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) [ 821.911701][T17722] loop3: detected capacity change from 0 to 4 [ 821.951698][T17722] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 821.971484][T17722] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x10000400}, {&(0x7f00000000c0)="f88c2f41aaf5e7e5b114014491981c6448c94ec59c50bff0a56472", 0x1b, 0x20}], 0x0, &(0x7f0000000180)={[{@test_dummy_encryption}], [{@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@fowner_lt={'fowner<', 0xee01}}, {@permit_directio}, {@fsname={'fsname', 0x3d, 'test_dummy_encryption'}}]}) [ 822.073477][T17722] loop3: detected capacity change from 0 to 4 [ 822.101949][T17722] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300), 0x0, 0x0) [ 822.136513][T17722] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300074000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:18 executing program 5: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f00000000c0)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0x1ffffffe, 0x80, 0x80, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x980912, 0x5, '\x00', @value64=0x2d8b}}) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 11:47:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000950000020000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300), 0x0, 0x0) 11:47:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xc00000000000000) 11:47:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 822.461004][T17772] loop3: detected capacity change from 0 to 4 11:47:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) stat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@getqdisc={0x3c, 0x26, 0x2, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0x1}, {0xfff2, 0xfff1}, {0x1f, 0x9}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x480c1}, 0x4000) r0 = fanotify_init(0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000000e00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000001c0)={0xfffffff7, 0x5f, 0x8000, 0xffb9, 0x1, 0xfd}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x103001, 0x2) fanotify_mark(r0, 0x105, 0x4000103b, r2, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) [ 822.530753][T17772] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000950000020000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300), 0x0, 0x0) [ 822.573031][T17772] EXT4-fs (loop3): Can't read superblock on 2nd try [ 822.675062][T17772] loop3: detected capacity change from 0 to 4 [ 822.697359][T17772] EXT4-fs (loop3): Test dummy encryption mode enabled [ 822.764032][T17772] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000950000020000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) 11:47:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230007a000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xd00000000000000) 11:47:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) r1 = fanotify_init(0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r1, 0x105, 0x4000103b, r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}, 0xfffffffd}, @llc={0x1a, 0x0, 0x6, 0x7f, 0x0, 0x20, @remote}, @nl=@unspec, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='erspan0\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001d40)='vegas\x00', 0x6) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x1, 0x3, 0x2, 0x4, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, '\x00', 0x43}, 0x9}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001840)="d6c2598461d122f33465b175350477f5e3e337c088dba52f941d78f5d4b5fe8f8669339d50c9f5f7573216c06d12ab82a6921d4971835b2788b1bbd6e4e315351eb0fac782ff93e2236b8dd8fa8523c4ff1f330b58a99a21e11c9757af496d082d06e2dcb279fc81dba00bb3aed1795564961d5b674b3dce91c6501792b12e8fc81d7372f42fe85a5ca519f2a519e137aeb2b37240648363d0290333fc7956b074671bd4e6faaa5b710e806cd85735d949eb39d871295aa1432e97fa4fc18bc8edccbe4c66be96ca2314d4f3520050f3ac876fd2e6c9d456b994161c66d918f9edc339107e14aac08a39d3af3bb2f04bef4731", 0xf3}, {&(0x7f0000000280)="aa0e42061051b7dec69b8ef2fffdd7878b4adc658e3845c47d6e24e4cea19cecaa4189ccdced3271da4a9020fdec1a05c7ee1caa1bd7", 0x36}, {&(0x7f0000001940)="6424a69a9326bd48e2c17d9ee5d6204b88c8071a2b087b496631aa6b9b3761d5e8ee628e4eb3614e80ec897d6de51aef2bf52270736a9de190bffa3fbf17338d63fe008c06532709b7c992ef7e7f0ad308893d71256f2a9e57d0d26bf3047c5f91e9d14582587ef66290d14e744ff02569f0dc7e83ebfaf98bad1205f34867e7116721ae45d4bebb2ec47f705ae3b541e54c389632a84423eceaf458d479ddb1573591e2596f562bdeb0afb916a8de0b00e0a171223b56c1d27201c1528ac51f4f42960968d8dc7e", 0xc8}, {&(0x7f00000002c0)="d70347917ca36c55fe8e426e992464ffa15de25412b626cb66ed880c8f79206be33544cfb0e9dbf11b27381c3d286762e32590e5f212c3929eb5eb8c5ef6af0f309ad71db95432243e6f6cf674e42815dbd9389fd14052f248e00c4155f061", 0x5f}], 0x4, &(0x7f0000001a80)=[{0xe8, 0x10d, 0x1, "5482e59effb2715d0fd20f2ce2f84f0fcc76ae38ef137516c313cc329ddccf491e60eadf525d902a8c799ba687e2a8ca5226098ca850d61ab27d42e498c782ec6119ce1eaa48f972b4248823e8d62c851cdba8456ab43cb66f14174afd61bed03f97ced0321e2b5d0aa57c6a94fe7de613b5b23b0cea85a76d7a74a903d78957b18784caa15e308916bab39314b286bfba92fb7534bdcce17694b75e6aef628237f0c574cbaf5b7c6bc58fa52e6fb89d0fdd52fbfaf11e6e1c0082e418ccab1ed7b28ef55e353694c35d704ac401f10c73f6bd7d7e"}, {0x60, 0x10f, 0x20, "e93083be6c4dc868a99c638fc7a61605b6ea396693b7ff3b5f3251ef1f67988c3155f0ab9fefab24799079e982dcc917dd4ec18b31234ca7a0f20d18fdfd16fee821c90f8dcb3d7ae8b966c5c3"}, {0x90, 0x101, 0xcd0, "b5d2905ef13083d17527e0b1ac02a0dfd0324c29d06d4da34b8b8f63e89ea946f89752740e16dbd5e70482e7c9196d14a3505089c8880829bd4eb229fe6693e3ee8f04281b3de4881e2e1167e539574bba2b5c567fba4159d23ef04e55f20697311600ac804b67a500687c24b3f2deb566a43ead1eb0fc6f35ceaf649c62b7fe"}, {0x88, 0x10d, 0xfffffffe, "ced0c55291643d8723d6fd8761470b07144194a3ffe16d0058b3dfe5f77ecf090f1ef92275de657bf9484d4148078606fec96cd5ff9bf2d2353f3b69b58c9649e7c9b5612b993f782cf611ad9c3926ef6f9f94006aaba1219f19f27f4031e71c16155e6b3391c2048a5c0daef85264e7ab8592"}], 0x260}}], 0x1, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000680)={{r4}, r6, 0x4, @unused=[0x0, 0x0, 0x835], @subvolid=0x8000}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000340)={{}, r6, 0x0, @unused=[0x8, 0x400, 0xfff, 0x95], @subvolid=0x7ff}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000100)={"020082b02b8f6400449adeb170133db6", r6, 0x0, {0x0, 0x8}, {0x7fffffff, 0x8}, 0x9d, [0xf16, 0xff, 0x50, 0x100000001, 0x2, 0x79, 0x3f, 0x3, 0x4e, 0x4, 0x94, 0x9, 0x8000, 0x100000000, 0x6, 0x3]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000340)={{r2}, r6, 0x4, @unused=[0xf7, 0x9, 0x1b, 0x7fffffff], @devid}) 11:47:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 823.088299][T17824] loop3: detected capacity change from 0 to 4 [ 823.134219][T17824] EXT4-fs (loop3): Test dummy encryption mode enabled [ 823.170608][T17824] EXT4-fs (loop3): Can't read superblock on 2nd try [ 823.290786][T17824] loop3: detected capacity change from 0 to 4 [ 823.321707][T17824] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:19 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 823.361639][T17824] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300089000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:19 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) r1 = fanotify_init(0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r1, 0x105, 0x4000103b, r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r5, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}, 0xfffffffd}, @llc={0x1a, 0x0, 0x6, 0x7f, 0x0, 0x20, @remote}, @nl=@unspec, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='erspan0\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001d40)='vegas\x00', 0x6) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x1, 0x3, 0x2, 0x4, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, '\x00', 0x43}, 0x9}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001840)="d6c2598461d122f33465b175350477f5e3e337c088dba52f941d78f5d4b5fe8f8669339d50c9f5f7573216c06d12ab82a6921d4971835b2788b1bbd6e4e315351eb0fac782ff93e2236b8dd8fa8523c4ff1f330b58a99a21e11c9757af496d082d06e2dcb279fc81dba00bb3aed1795564961d5b674b3dce91c6501792b12e8fc81d7372f42fe85a5ca519f2a519e137aeb2b37240648363d0290333fc7956b074671bd4e6faaa5b710e806cd85735d949eb39d871295aa1432e97fa4fc18bc8edccbe4c66be96ca2314d4f3520050f3ac876fd2e6c9d456b994161c66d918f9edc339107e14aac08a39d3af3bb2f04bef4731", 0xf3}, {&(0x7f0000000280)="aa0e42061051b7dec69b8ef2fffdd7878b4adc658e3845c47d6e24e4cea19cecaa4189ccdced3271da4a9020fdec1a05c7ee1caa1bd7", 0x36}, {&(0x7f0000001940)="6424a69a9326bd48e2c17d9ee5d6204b88c8071a2b087b496631aa6b9b3761d5e8ee628e4eb3614e80ec897d6de51aef2bf52270736a9de190bffa3fbf17338d63fe008c06532709b7c992ef7e7f0ad308893d71256f2a9e57d0d26bf3047c5f91e9d14582587ef66290d14e744ff02569f0dc7e83ebfaf98bad1205f34867e7116721ae45d4bebb2ec47f705ae3b541e54c389632a84423eceaf458d479ddb1573591e2596f562bdeb0afb916a8de0b00e0a171223b56c1d27201c1528ac51f4f42960968d8dc7e", 0xc8}, {&(0x7f00000002c0)="d70347917ca36c55fe8e426e992464ffa15de25412b626cb66ed880c8f79206be33544cfb0e9dbf11b27381c3d286762e32590e5f212c3929eb5eb8c5ef6af0f309ad71db95432243e6f6cf674e42815dbd9389fd14052f248e00c4155f061", 0x5f}], 0x4, &(0x7f0000001a80)=[{0xe8, 0x10d, 0x1, "5482e59effb2715d0fd20f2ce2f84f0fcc76ae38ef137516c313cc329ddccf491e60eadf525d902a8c799ba687e2a8ca5226098ca850d61ab27d42e498c782ec6119ce1eaa48f972b4248823e8d62c851cdba8456ab43cb66f14174afd61bed03f97ced0321e2b5d0aa57c6a94fe7de613b5b23b0cea85a76d7a74a903d78957b18784caa15e308916bab39314b286bfba92fb7534bdcce17694b75e6aef628237f0c574cbaf5b7c6bc58fa52e6fb89d0fdd52fbfaf11e6e1c0082e418ccab1ed7b28ef55e353694c35d704ac401f10c73f6bd7d7e"}, {0x60, 0x10f, 0x20, "e93083be6c4dc868a99c638fc7a61605b6ea396693b7ff3b5f3251ef1f67988c3155f0ab9fefab24799079e982dcc917dd4ec18b31234ca7a0f20d18fdfd16fee821c90f8dcb3d7ae8b966c5c3"}, {0x90, 0x101, 0xcd0, "b5d2905ef13083d17527e0b1ac02a0dfd0324c29d06d4da34b8b8f63e89ea946f89752740e16dbd5e70482e7c9196d14a3505089c8880829bd4eb229fe6693e3ee8f04281b3de4881e2e1167e539574bba2b5c567fba4159d23ef04e55f20697311600ac804b67a500687c24b3f2deb566a43ead1eb0fc6f35ceaf649c62b7fe"}, {0x88, 0x10d, 0xfffffffe, "ced0c55291643d8723d6fd8761470b07144194a3ffe16d0058b3dfe5f77ecf090f1ef92275de657bf9484d4148078606fec96cd5ff9bf2d2353f3b69b58c9649e7c9b5612b993f782cf611ad9c3926ef6f9f94006aaba1219f19f27f4031e71c16155e6b3391c2048a5c0daef85264e7ab8592"}], 0x260}}], 0x1, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000680)={{r4}, r6, 0x4, @unused=[0x0, 0x0, 0x835], @subvolid=0x8000}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000340)={{}, r6, 0x0, @unused=[0x8, 0x400, 0xfff, 0x95], @subvolid=0x7ff}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000100)={"020082b02b8f6400449adeb170133db6", r6, 0x0, {0x0, 0x8}, {0x7fffffff, 0x8}, 0x9d, [0xf16, 0xff, 0x50, 0x100000001, 0x2, 0x79, 0x3f, 0x3, 0x4e, 0x4, 0x94, 0x9, 0x8000, 0x100000000, 0x6, 0x3]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000340)={{r2}, r6, 0x4, @unused=[0xf7, 0x9, 0x1b, 0x7fffffff], @devid}) 11:47:19 executing program 5: write$sequencer(0xffffffffffffffff, &(0x7f00000000c0)=[@e={0xff, 0xc, 0x1, 0x3, @generic=0xff, 0x4, 0x1, 0x80}, @e={0xff, 0x1, 0x8, 0x20, @SEQ_NOTEON=@note=0x15, 0x67, 0xb1, 0xf9}, @n={0x1, 0xaa, @SEQ_NOTEON=@note=0x5, 0x18}, @t={0x0, 0x1, 0x4, 0x9, @generic=0x80000001}, @generic, @s={0x5, @generic=0x60, 0x10, 0x4}], 0x21) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) r0 = syz_mount_image$squashfs(&(0x7f0000000140), &(0x7f0000000180)='./file0/file0\x00', 0x80, 0x1, &(0x7f0000000240)=[{&(0x7f00000001c0)="6b363dcca2a9be55f5e0b1e7e53661b5ce", 0x11, 0x20}], 0x20, &(0x7f0000000340)={[{'ext4\x00'}, {'test_dummy_encryption'}, {'test_dummy_encryption'}], [{@euid_lt={'euid<', 0xee01}}, {@pcr={'pcr', 0x3d, 0x21}}, {@smackfsroot={'smackfsroot', 0x3d, 'test_dummy_encryption'}}]}) openat(r0, &(0x7f0000000280)='./file0\x00', 0x581043, 0x100) r1 = fanotify_init(0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r1, 0x105, 0x4000103b, r2, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) r5 = memfd_create(&(0x7f0000000080)='\x00', 0x5) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) fchown(r5, r4, r7) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000400), 0x202440, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_uid={'access', 0x3d, r4}}, {@debug={'debug', 0x3d, 0x100}}, {@access_any}], [{@dont_appraise}, {@audit}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@appraise_type}, {@appraise}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'squashfs\x00'}}]}}) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x202) syz_open_dev$evdev(&(0x7f00000005c0), 0x62, 0x200) r9 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000540)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) fanotify_mark(r9, 0x0, 0x12, r8, &(0x7f0000000580)='./file0\x00') creat(&(0x7f0000000080)='./file0/file0\x00', 0x4) 11:47:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xe00000000000000) 11:47:19 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 823.591009][T17867] loop0: detected capacity change from 0 to 4 11:47:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 823.642107][T17870] loop3: detected capacity change from 0 to 4 [ 823.659943][T17867] EXT4-fs (loop0): Test dummy encryption mode enabled [ 823.706255][T17867] EXT4-fs (loop0): Can't read superblock on 2nd try [ 823.722205][T17870] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:19 executing program 5: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000040)={{0x28, 0xf2}, 'port0\x00', 0x4, 0x0, 0x5, 0x9, 0x40, 0x4, 0x4, 0x0, 0x4, 0x3f}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 823.758342][T17870] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xd00000000000000) 11:47:20 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 823.864946][T17870] loop3: detected capacity change from 0 to 4 [ 823.892143][T17870] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 823.930812][T17870] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:20 executing program 5: r0 = request_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='ext2\x00', r0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x4000, 0xbe, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x4808, &(0x7f0000000300)=ANY=[@ANYBLOB="746573745f64716d6d0400656e6372797074696f6e2c00"]) 11:47:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000d0000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xf00000000000000) 11:47:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 824.228117][T17926] loop3: detected capacity change from 0 to 4 11:47:20 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 824.300178][T17926] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000950000020000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 824.358358][T17926] EXT4-fs (loop3): Can't read superblock on 2nd try [ 824.455958][T17926] loop3: detected capacity change from 0 to 4 [ 824.491526][T17926] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="745f656e74692f6e93a7"]) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 11:47:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 824.558917][T17926] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230fffe000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000d0000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 824.805100][T17970] loop3: detected capacity change from 0 to 4 11:47:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x1000000000000000) 11:47:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 824.866855][T17974] loop0: detected capacity change from 0 to 4 [ 824.886056][T17970] EXT4-fs (loop3): Test dummy encryption mode enabled [ 824.933774][T17970] EXT4-fs (loop3): Can't read superblock on 2nd try [ 824.943295][T17974] EXT4-fs (loop0): Test dummy encryption mode enabled [ 824.970865][T17974] EXT4-fs (loop0): Can't read superblock on 2nd try 11:47:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000ff000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:21 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f00000000c0)='.\x00', 0x10001, 0x1, &(0x7f0000000200)=[{&(0x7f00000007c0)="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", 0x1000, 0xff}], 0x5060, &(0x7f0000000240)={[{'/'}, {'/proc/crypto\x00'}, {']q:'}, {'\x00'}, {'ext4\x00'}, {'S[\xc4,-($'}], [{@defcontext={'defcontext', 0x3d, 'root'}}]}) r2 = memfd_create(&(0x7f0000000080)='\x00', 0x5) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = epoll_create(0x4) sendfile(r0, r5, &(0x7f0000000280)=0xffffffff, 0x3ff) fchown(r2, r1, r4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)={[{@block_validity}], [{@pcr={'pcr', 0x3d, 0x3a}}, {@uid_eq}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@fowner_lt={'fowner<', r1}}, {@dont_hash}]}) 11:47:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 825.301851][T18005] loop3: detected capacity change from 0 to 4 [ 825.376722][T18005] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x1100000000000000) [ 825.449086][T18005] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="747a797074696f6e2c000000000000000016000000000079e3e6ba0149064fa3a3ef229714edaab51c0b1b6c66ebf783d5ca327c15e2f9a74d66a36e2eb3c9dae68ec3943fbbaa4515179915acf822d203151fb539dc"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x20000, 0x0) renameat(r1, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') 11:47:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd", 0xa}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 825.550428][T18005] loop3: detected capacity change from 0 to 4 [ 825.583684][T18005] EXT4-fs (loop3): Test dummy encryption mode enabled [ 825.615844][T18005] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300fff000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd", 0xa}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 825.957580][T18052] loop3: detected capacity change from 0 to 4 11:47:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 826.017628][T18052] EXT4-fs (loop3): Test dummy encryption mode enabled [ 826.037842][T18052] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x1200000000000000) 11:47:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300), 0x0, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 826.140989][T18052] loop3: detected capacity change from 0 to 4 [ 826.169847][T18052] EXT4-fs (loop3): Test dummy encryption mode enabled [ 826.204803][T18052] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) r0 = syz_mount_image$minix(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x10000, 0x5, &(0x7f0000003340)=[{&(0x7f0000000340)="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", 0x1000, 0xfffffffffffffff4}, {&(0x7f0000000140)="1f3ad64693f88e0693a7ccec36153a6b8ca5a4aa6521d5c261a4cd3f8a1952f596251605ebcbd1c785a616fcda98d621e8c9d16d9a860dd0bc501078236ffeb9093ca4172d49e455294f2ec4a27b84d84f70007e2cc1f1964808086b47dca6", 0x5f, 0xffff}, {&(0x7f0000000240)="18d3c1f71af023ab85cbd8f2ecfe3b6033b247fa423e7e8abc10ee734b6cc1211ef2c1278923b7b650267fd3e0b1c1d1bfbb190fdc865ff928ccbd74a19f77e67f010f1397e3196c0cf9e415a9f3339654a933", 0x53, 0x81}, {&(0x7f0000001340)="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", 0x1000, 0x8}, {&(0x7f0000002340)="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", 0x1000, 0x3}], 0x1, &(0x7f00000033c0)={[{'/#^(&\\{Y'}, {'ext4\x00'}, {'\x00'}, {'ext4\x00'}, {'#(-,:&\xc8\xfe'}, {'ext4\x00'}], [{@obj_role={'obj_role', 0x3d, 'test_dummy_encryption'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@dont_measure}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@seclabel}]}) mknodat(r0, &(0x7f0000006000)='./file0\x00', 0x8000, 0x6f3) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = fanotify_init(0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r3, 0x105, 0x4000103b, r4, 0x0) getsockopt$IP_SET_OP_VERSION(r4, 0x1, 0x53, &(0x7f0000005540), &(0x7f0000005580)=0x8) r5 = memfd_create(&(0x7f0000000080)='\x00', 0x5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/crypto\x00', 0x0, 0x0) r6 = fanotify_init(0x0, 0x0) fanotify_mark(r6, 0x105, 0x4000103b, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) fchown(r5, r2, r8) syz_mount_image$v7(&(0x7f0000004000), &(0x7f0000004040)='./file0\x00', 0x3fe, 0x6, &(0x7f0000005400)=[{&(0x7f0000004080)="c72898d1b9ede4e5e4f964ad7a2b9dc6e5221152cccda6721dc0326f2ba75bd825d966239b75229cae9a848594baa5fcef0efb5d1c555b327e50c3071b0fa0401b4cbcde9988d1b9c93ff090012bf9acb8838270c0461fdabe97a08e3735cadcd31a53320a6373232f9da62eff96558772342b52440802e5a85b899309445727a755829373541bdc0021", 0x8a, 0x9}, {&(0x7f0000004140)="889467c9869f68fff8fa124fa62484cb8932b8a4771adcb8cb3cd0e3d9b724ac3caa0ddb6339522d139e29513694341e1a73e3c31f16687a20bb1098715e9421199c4cefd39bd7b9c0d4bd3c37e1bb5774d848d6e25e073c1e607bdf6aeb4a5e6bf891e9ebf90702ee8779e98f4d5b736171d9614192277042070b3a5bee8d1cd7e69bce2c8c9c09321c9e77ed6aefb99a0fb9f5ec022024f8cb4c898465c4f7a56f8a03f05621c9ac877aa64fd551424eb28e0a41e4e70d8817104b3747d631c285440c8b1f9113f9e819f71da72acfa88d3e4de956709cc28e46dc2a20dbbb140db978b48377c7f5ef5f8386539f0384e15cb3c55222", 0xf7, 0x87f}, {&(0x7f0000004240)="48ef6709d2f0824b3cad3a36a231df5235e69ee83ef48187c6e397eb6e04a6275cd57a1c67e7670ce4a5707efc1eb8a5be8c407ae5d19d8b595f70ce2bf1068cea2993147a456ce8ce88354f424f2c3125b194d15535161ba9e91503824011f80e974a", 0x63, 0x80000001}, {&(0x7f00000042c0)="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", 0x1000, 0x7}, {&(0x7f00000052c0)="9d5922a08feac95b07c8ba7e4908aaa7e518c048492d96f0e8dc832d8318cc301a53dcda98c66221618b377325b973be77c2b16f85314e5491948b204836cccb81e72af22982e5dd9f7ed50b36efcde9facd71b80e0363520265668bbb4feb26cf544685333b844b657fbb294c6968da56f6c007117810d962c0d8000334390d17", 0x81, 0x1}, {&(0x7f0000005380)="6ab99d6c6f33757dcd71d2d3176eda91dae4761e6cd24e434f9ae35f0770b0b2c16ec89ef7586ae0ce29c4d8347fed20f032329c906d4a5eb6ed729c1d5fa714b6b62cb550f76c56e9f9b3b076f0", 0x4e, 0xffffffffa6c2a05f}], 0x9420, &(0x7f00000054c0)={[{}, {'!&'}, {'u32\x00'}, {','}], [{@euid_gt={'euid>', 0xee01}}, {@fowner_lt={'fowner<', r2}}, {@seclabel}]}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000003480)={'ip6gre0\x00', 0x0, 0x29, 0x6, 0x3f, 0x1, 0x20, @remote, @empty, 0x8000, 0x8, 0x58badbad}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000003fc0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000006040)=ANY=[@ANYBLOB="840a00002c0000062bbd7000ffdbdf2500000000", @ANYRESOCT=r7, @ANYRESHEX=r0], 0xa84}, 0x1, 0x0, 0x0, 0x10}, 0x4000810) 11:47:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230feff000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300700000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='test_dummy_uncryption,\x00']) [ 826.577054][T18102] loop0: detected capacity change from 0 to 4 [ 826.594085][T18103] loop3: detected capacity change from 0 to 4 11:47:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x1800000000000000) 11:47:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 826.664846][T18102] EXT4-fs (loop0): Test dummy encryption mode enabled [ 826.696683][T18103] EXT4-fs (loop3): Test dummy encryption mode enabled [ 826.722438][T18102] EXT4-fs (loop0): Can't read superblock on 2nd try [ 826.748133][T18103] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="74659f5f69072048c2572be94a90e50e704d73745f64756d6d795f656e6372797074696f6e2c00"]) r0 = syz_io_uring_complete(0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x204, 0x1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) syz_mount_image$affs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0xef, 0x0, &(0x7f0000000540), 0x4440, &(0x7f00000002c0)={[{'\xe9\xef~\x87\xbf\xe7Q\xfcm\xbeZ\xec\x85Z\xe8>> \xec\xaa+\x87\x02\x93\xedf\xcb66t\xd8\xdf\xd3\xad>=1\xbb\x96\x95\xdf\xd9\bX5}\xba%\x1b6\x88L\x84\x11\xe4K\xce\x93\x8a\a\f\x9d\xbdH;\xe1\xf2\x85|\x94\x942\xc1\x9f\xc8\\\fC\vF\xd9O\x81\x12\f\x80\xbf\x94\x9eW.G\xf2]f\",\x1fM\xf9K_@T+\x1a\xcd\xb4\x01\xd4\xe4\xbb\x94\xaa\xbe\x04\xe65\xae\xc8\xaa\xee\xaf\xa1\xf3\x1c\xfb\xb0[\xdd!4\xae\x02\xf4\x9765\xb0V\xda*\xe9eM`\x8d\xcb\xe7\xf4\x11\x15\xa8.\f\xdd\xad\x92\xf7W\xb6~rTHB\xb6\x90\x893\x99\x86+\x95\xa3a\x91\xeb2\"ae\xe3\x1b\xbc&X\xdf\x9e\x06\x98}|JZD\xd7KWaE\x1cs\x15&-I\xa8\xba\x8b\xd5\x84\xd5\xfd\x17\xae\xc8=\x8b\xc4\xfb&B\xf2d:\xd8\xe5\x00\x9a\a\xc0_Emg\xb3=\xa2\a\xf4s\x15[j\fJfI\x1d\xa2\xa9\x02U\x16dw:]:^k\xbf\xc5\xc7\x85%H57\xc7NU\xffZ\xf1\x12\x01\xfb\xbe\x82\x15\x96|m\xe0\xf1\xb3tQ\x1dLQ\x99\xa4u\xc2v^\b\xe8J\x8d\x05\xf5\xd6\xa5\x8a<\xf51\xc1$\x98\xd2\x9f\xd3\xcfd`}\x9bC'}, {'measure'}, {}, {'\x00\x00\x00\x00\x00'}, {'/{-'}, {',+#$'}, {'ext4\x00'}], [{@uid_gt={'uid>', r1}}, {@hash}, {@measure}, {@pcr={'pcr', 0x3d, 0xf}}]}) [ 826.863407][T18103] loop3: detected capacity change from 0 to 4 [ 826.892901][T18103] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 826.947504][T18103] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000010000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x2000000000000000) 11:47:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 827.271324][T18157] loop3: detected capacity change from 0 to 4 11:47:23 executing program 5: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, 0x0, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x101}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x8800}, 0x4) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0x3, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r0, 0x400, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x20044080) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="746573745f6403006d795f656e63727970746907002c00"]) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000001980), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}]}, 0x28}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x5c, r2, 0x20, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7ff}, @BATADV_ATTR_HOP_PENALTY={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x400}]}, 0x5c}}, 0x80004) [ 827.350747][T18157] EXT4-fs (loop3): Test dummy encryption mode enabled [ 827.385873][T18157] EXT4-fs (loop3): Can't read superblock on 2nd try [ 827.471595][T18157] loop3: detected capacity change from 0 to 4 [ 827.505140][T18157] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 827.548369][T18157] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:23 executing program 5: fstat(0xffffffffffffffff, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@usrquota}]}) 11:47:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000011000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 827.907520][T18202] loop3: detected capacity change from 0 to 4 11:47:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x2500000000000000) 11:47:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="20d60000000f00000affff010000000080a6f2d7897c31d7720000ddf4655fdcf4655f0100ffff530900000000000000000700005b35cc958b387e1fa1e52bdcbbe74e5d856561d8e8f0e13f9ad0a045fd8a9efaaa1b4ae0413d13561f6b66a4e9978af8fe14792a37f25f4c13d6a4da3fe25257796d0e5a3763e08e3f9aad76919da93c61ea2f", 0x87, 0x400}, {&(0x7f0000000080)="e51bfd320797c780b419cc1ed4c543b154edfea00c11e24c2c85f2139e97fde09504afb1484616cc32c95e7edca4560772", 0x31, 0x8a}], 0x1804810, &(0x7f0000000300)={[{@nobarrier}]}) [ 827.951250][T18202] EXT4-fs (loop3): Test dummy encryption mode enabled [ 827.970104][T18202] EXT4-fs (loop3): Can't read superblock on 2nd try [ 828.074973][T18202] loop3: detected capacity change from 0 to 4 [ 828.105415][T18202] EXT4-fs (loop3): Test dummy encryption mode enabled [ 828.153015][T18202] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000012000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:24 executing program 5: r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000000)={0x0, 0x1, [0x5, 0x4001, 0x2, 0x7f, 0x8, 0x3, 0x1ff, 0x5]}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 828.496320][T18247] loop3: detected capacity change from 0 to 4 11:47:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x4000000000000000) 11:47:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 828.545718][T18247] EXT4-fs (loop3): Test dummy encryption mode enabled [ 828.586138][T18247] EXT4-fs (loop3): Can't read superblock on 2nd try [ 828.695900][T18247] loop3: detected capacity change from 0 to 4 [ 828.725264][T18247] EXT4-fs (loop3): Test dummy encryption mode enabled [ 828.790852][T18247] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:25 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = memfd_create(&(0x7f0000000080)='\x00', 0x5) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) fchown(r3, r2, r5) mount$9p_virtio(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x20000, &(0x7f0000000740)={'trans=virtio,', {[{@access_uid={'access', 0x3d, r0}}, {@uname={'uname', 0x3d, 'ext4\x00'}}], [{@dont_measure}, {@fowner_lt={'fowner<', r2}}, {@appraise_type}, {@appraise}]}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d6020040000000030003023000000021000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x4100000000000000) [ 829.169983][T18286] loop3: detected capacity change from 0 to 4 11:47:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 829.258121][T18286] EXT4-fs (loop3): Test dummy encryption mode enabled [ 829.288079][T18286] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000001, 0x0, &(0x7f0000000040), 0x80, &(0x7f0000000080)=ANY=[@ANYRESDEC]) 11:47:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000307300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 829.367123][T18286] loop3: detected capacity change from 0 to 4 [ 829.412554][T18286] EXT4-fs (loop3): Test dummy encryption mode enabled [ 829.460824][T18286] EXT4-fs (loop3): Can't read superblock on 2nd try [ 829.533840][T18318] loop0: detected capacity change from 0 to 4 11:47:25 executing program 5: ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000340)={0x0, 0xfb, 0xd7, 0x4, 0xff, "37024f1a964ee38ee5d01277b24d60e8", "41743d703415d8a044238b264fb403d7a5da4bf6e965d2289673d586755aeeee107fd3d9d40c63181939ceea312b1ae09b60864eee7734728aa3c06397ac30a4e72e2ef27ea91fc43f4f72c21e00d57386bc1a9f961c407def0d0919c9a53f8b437566784fb8253fbbd22b43e0257f7b4090a1fd0983ab1be24e9ad6c797fd087aac30d212dd5a868d11734006955dc03de190a8a909042e4b98befce34a7ecc6dae6ff0a5ba5f8b91d11cc7a7d85b4e6350734798b92e48f6c696b32bae975a330e"}, 0xd7, 0x2) 11:47:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000002e000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 829.640731][T18318] EXT4-fs (loop0): Test dummy encryption mode enabled 11:47:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x5c00000000000000) [ 829.725074][T18318] EXT4-fs (loop0): Can't read superblock on 2nd try [ 829.781008][T18333] loop3: detected capacity change from 0 to 4 11:47:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000307300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 829.865546][T18333] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x3ff, 0x6, &(0x7f0000001500)=[{&(0x7f00000000c0)="e2cf4ddbe7f35550481d21f0e9df54186833bfcdb7203043ce09bcb786663c402a8d20dd02376cf858f16548435acea695b68b261b6c", 0x36, 0x1}, {&(0x7f0000000140)="69414bcc4fcf27e340ee2699a64080d16b74c1266c3fa198cd365c9ae1da4f069ab5a747082d1aef2a1d70d69ea292292a864d1388eb843a4d048bdda8edff0379a02e0cafd25632a81c11732671ad6004bf38709b156a41ec633cca4427a64aae6ff5862ce8af8aee37131c79895ef378aec20b614725181b3d957fa7fd99d08275ebd17016ea3c432baf270ec68ca6c822fb844bc5bf18c743dd251ac5ba04", 0xa0, 0xffffffffffff2975}, {&(0x7f0000000340)="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", 0x1000, 0x3}, {&(0x7f0000000240)="b9ca8ff337942d443abb9f9c4c6f3d8d9b72242eff9ba0d38f5e3ffc4a66ad69f34b7f7b45131913a1d5ffcf7ae8aec1a2f2712f4a75e2d3a09ae82827a74ffbcb72e83be612931b2ec3d44caf7b804567d0b39b860ab2db34ea5715d48805d1da6b09bf992a6bb256c480f15021486267b4e2c7ae0d7591cf", 0x79, 0x6}, {&(0x7f0000001340)="5a1d4a3767994e2d1516c66322fb740a2776cf954815785dd7b1c15caa200e98efd7fa5919d7f8b9969eb2984f194bb0f699fa88fa1d2b037b77a454b5ab86393c0006598510859f6431b82e57761abeae082182a99bef87f7aa072f00174ea4927d58711062b88ad0cfb548116a71ac7a30a7078df381be2fcf1faa99ecea90eee76b7f27da48ec62be2e1ae9f697e54a337c3ac340f7405288311d0705", 0x9e, 0xf7}, {&(0x7f0000001400)="656f84d004b6db4c19500dbc9a2a5fea83124574a0242c43c30061bedd7d01d317ba08bd9ab47b05fa5188972c0fa41c8f08f4ab4f1fba17740944942998ff70cf3b0582e1dbea2f7efed4fafd408ed527d19ee6dbcec9ae36a256cdf55854caa83b258e194ce975258f6fd982f139fc5195f46d5a6099bc6e567ec2fa0475b5bbe74d88de7fd21c247be1f56df9bd28526501327faad18b6c00652bfcfd291fd52e7fd9116ed8fdcbec3119d4ac47b2ce581018766200794e7a7128934a1aaf6e00284f9f2d9166f95f527813175cd57f5be89e8307b7da", 0xd8, 0x2}], 0x800002, &(0x7f00000015c0)={[{@acl}, {@grpjquota}, {@journal_checksum}, {@data_writeback}], [{@seclabel}, {@dont_measure}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@audit}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) [ 829.915588][T18333] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 830.045779][T18333] loop3: detected capacity change from 0 to 4 [ 830.098641][T18333] EXT4-fs (loop3): Test dummy encryption mode enabled [ 830.105740][T18333] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x4, 0x1001, r1, &(0x7f00000000c0)='./file0\x00') r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r2, 0x105, 0x4000103b, r3, 0x0) r4 = fanotify_init(0x0, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r4, 0x105, 0x4000103b, r5, 0x0) r6 = fanotify_init(0x0, 0x0) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r6, 0x105, 0x4000103b, r7, 0x0) dup2(0xffffffffffffffff, r6) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x10000) r8 = fanotify_init(0x0, 0x0) r9 = creat(&(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8601, 0x10) fanotify_mark(r8, 0x105, 0x4000103b, r9, 0x0) r10 = syz_io_uring_complete(0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="dc000000", @ANYRES16=0x0, @ANYBLOB="000827bd7000fcdbdf25020000003400078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="0c00080003000000000000000c00040007000000000000003400078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="253316b2", @ANYRES32, @ANYBLOB="0c00060002000000000000000c00060001000000000000000c00040008000000000000000c00030009000000000000000c00050000000000000000000c0004006900000000000000"], 0xdc}, 0x1, 0x0, 0x0, 0x40}, 0x4040) [ 830.146720][T18356] loop0: detected capacity change from 0 to 4 11:47:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000005e000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 830.217135][T18356] EXT4-fs (loop0): Test dummy encryption mode enabled [ 830.252139][T18356] EXT4-fs (loop0): Can't read superblock on 2nd try 11:47:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x8000000000000000) 11:47:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x1000000000000, 0x0, 0x0) 11:47:26 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getnexthop={0x3c, 0x6a, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@NHA_MASTER={0x8}, @NHA_MASTER={0x8}, @NHA_MASTER={0x8, 0xa, 0x2}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20004800}, 0x48801) r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x7f00, 0x1f, 0x8, {{0x6, 0x4, 0x1, 0x7, 0x18, 0x68, 0x0, 0x1f, 0x2d, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, {[@end]}}}}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x174, r1, 0x8, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_OURS={0x74, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x6a, 0x4, "c4c1e422d2c3461832d6697ea910fbd0a1af9e3c31cb1807f25ae755f34b01fdc978bd365c895867aae8732300e1de3b1f336c0755fc905d1e08c637ddc90a15d5be5934b73c0e58326cb4a61189551fb8f12c85ebcadff34181bee05a7600d7821463750122"}]}, @ETHTOOL_A_LINKMODES_OURS={0x90, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8000}, @ETHTOOL_A_BITSET_MASK={0x81, 0x5, "db59326b092b38ad945b8f2a561d75e34c5482addd99776a2c442bf5d38d17c25f8790b1c00e8f48aed634d670d6504546c5bc189949681c4b28edd9e06fd909180a3fb03dc1054c6d36907c6a911c12cd78a1c3074a17c8b5271562735962aa12e04cad147c365ea25c96fd5d57aff04b30a7d452f5503fe4e7cc8507"}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x3}, @ETHTOOL_A_LINKMODES_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 830.479932][T18389] loop3: detected capacity change from 0 to 4 11:47:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 830.526541][T18389] EXT4-fs (loop3): Test dummy encryption mode enabled [ 830.553229][T18389] EXT4-fs (loop3): Can't read superblock on 2nd try [ 830.628362][T18389] loop3: detected capacity change from 0 to 4 [ 830.654638][T18389] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@deltaction={0x4c, 0x31, 0x500, 0x70bd28, 0x25dfdbfc, {}, [@TCA_ACT_TAB={0x38, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) [ 830.688942][T18389] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300002000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000950000020000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000001000000000000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)=ANY=[]) r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) faccessat(r1, &(0x7f0000000040)='./file1\x00', 0x5b) chroot(&(0x7f0000000080)='./file0\x00') [ 831.053961][T18440] loop3: detected capacity change from 0 to 4 11:47:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xff00000000000000) 11:47:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 831.131172][T18440] EXT4-fs (loop3): Test dummy encryption mode enabled [ 831.181830][T18440] EXT4-fs (loop3): Can't read superblock on 2nd try [ 831.263102][T18440] loop3: detected capacity change from 0 to 4 [ 831.305507][T18440] EXT4-fs (loop3): Test dummy encryption mode enabled [ 831.339649][T18440] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:27 executing program 5: r0 = fanotify_init(0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000140), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binderN(&(0x7f0000000100), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000200)={0x44, 0x0, &(0x7f0000000800)=[@transaction={0x40046305, {0x0, 0x400c630e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) dup2(r2, r1) r3 = syz_open_dev$binderN(&(0x7f00000001c0), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)="aa"}) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x44, 0x0, &(0x7f00000004c0)=[@transaction={0x40046305, {0x0, 0x40046304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x44, 0x0, &(0x7f0000000540)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x58, &(0x7f00000006c0)={@flat=@weak_binder, @flat, @ptr={0x73622a85, 0x0, &(0x7f00000005c0)=""/234, 0xea}}, &(0x7f00000000c0)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r4, 0x0) r5 = syz_mount_image$pvfs2(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x80000000, 0x6, &(0x7f0000000400)=[{&(0x7f00000000c0)="63190112e2647f04e0b5680203e8e6c3b3a1095364fcff812ae8e0fc96cff2e2e38cc282ece0634ef10a2dcb", 0x2c, 0x4}, {&(0x7f0000000140)="dc7e803e8bd6555e21e5e62f368169b8aa938fbf0f35d7fe81aff841b675d9b809f5f608c29b2edf60f30a9ad56d0086273f19dff98e8f96562dadd1184f6620502c662e52240b0b7c69d2259fb9917c7c3065a17171963c6448e8adb7ce6bcf5229aecb5386d9c5541d408f18edde03388fe74be26338ba0c54516ccda1bbcb60cd0d7835295b8068f27892f30f1fadb8fe5a037d38216b56eefc7cc7f70545fba7a7c953480af892dcde73b38c41ac", 0xb0, 0x400}, {&(0x7f0000000240)="985ee9d1029c1e04d1e9abdd7e8ca5d0dcec33e489e7efa57c23a8a453c8dcbc5cd18289ea9607bf7aecda3de64291032ef8dfb0e487afadad61086a48f340c13f0567642be7b5aba2c3917a83", 0x4d, 0x9}, {&(0x7f00000002c0)="4a0005d69879ac015797e77ef67263172e01d0f0ab81a92907134392150de6a8299d47", 0x23, 0xdbd6}, {&(0x7f0000000340)="776ae274e5ac4d1acc4617db4774413dcf343be622524c602aae495176f8f05ced470df761fd9c18cced3e77ca35ed4c6c6ee528bac1c317eb6e92c381168ca9f4022a3513a9074832e9706e353c40e1bb", 0x51, 0x80000001}, {&(0x7f00000003c0)="92603cc644de357b23c1dc17c73f7aa02b5c5ec6d6e488e820cd40947b9bbd08", 0x20, 0xfff}], 0x21084c, &(0x7f00000004c0)={[{'test_dummy_encryption'}, {'.\'!'}, {'\xe9'}, {'test_dummy_encryption'}, {'ext4\x00'}, {}, {'*{]['}, {'-!&@.]!'}, {'ext4\x00'}], [{@smackfstransmute}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, 'ext4\x00'}}]}) dup3(r0, r5, 0x80000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='test_dummy,\x00'/23]) 11:47:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300003000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='test`dummy_enCryption,\x00']) 11:47:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0xffffffff00000000) [ 831.709637][T18485] loop3: detected capacity change from 0 to 4 [ 831.773302][T18485] EXT4-fs (loop3): Test dummy encryption mode enabled [ 831.792092][T18485] EXT4-fs (loop3): Can't read superblock on 2nd try [ 831.874214][T18485] loop3: detected capacity change from 0 to 4 [ 831.893518][T18485] EXT4-fs (loop3): Test dummy encryption mode enabled [ 831.903828][T18485] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x9, 0x0, 0x0) 11:47:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000950000020000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:28 executing program 5: bind$can_raw(0xffffffffffffffff, &(0x7f0000000040), 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x2, 0x3) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc, 0x4010, r0, 0xdfdf2000) 11:47:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300004000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 832.161111][T18525] loop3: detected capacity change from 0 to 4 11:47:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000950000020000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 832.240894][T18525] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000080)='test_dummy_encryption', &(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='ext4\x00', &(0x7f0000000180)='s\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000240)='].\x90\x00', &(0x7f0000000280)], &(0x7f00000005c0)=[&(0x7f0000000340)='\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='-\\\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\'(.-&&[[$\'\x00', &(0x7f0000000480)=']^\x00', &(0x7f00000004c0)='\'{\x00', &(0x7f0000000500)='+#[\x00', &(0x7f0000000540)='test_dummy_encryption', &(0x7f0000000580)='\x1e(!\x00']) 11:47:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fanotify_init(0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r2, 0x105, 0x4000103b, r3, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @pic={0xbb, 0x8, 0x8, 0x20, 0x2d, 0x8, 0x49, 0x17, 0x7f, 0x0, 0x1f, 0x80, 0x1f, 0x0, 0x3, 0x7}}) fanotify_mark(0xffffffffffffffff, 0x40, 0x48000000, r3, &(0x7f0000000500)='./file1\x00') ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000200)={[{0x9, 0x401, 0x7, 0xff, 0x7, 0x20, 0x0, 0x81, 0x0, 0x40, 0x4, 0x3, 0x9}, {0x200, 0xdda1, 0x1, 0x80, 0x7, 0x80, 0x4, 0x1, 0x3, 0x40, 0x2, 0x41, 0x2}, {0x3, 0x67, 0x8, 0x40, 0x5, 0x3f, 0x1f, 0xfa, 0xa2, 0x6, 0x5, 0x0, 0x4}], 0x8298}) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000040)={0xd000, 0x106000}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x101) r6 = syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r7 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) r8 = fanotify_init(0x0, 0x0) r9 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r8, 0x105, 0x4000103b, r9, 0x0) ioctl$KVM_SET_PIT2(r9, 0x4070aea0, &(0x7f0000000180)={[{0x0, 0x0, 0x5, 0x4, 0x3f, 0x8, 0x5, 0x0, 0x5, 0x1a, 0x3f, 0x3f, 0x3}, {0x3, 0x735, 0x1, 0x5, 0x0, 0x43, 0x8, 0x4, 0x9, 0x3, 0x0, 0x2, 0x3}, {0x1, 0x1f, 0x0, 0x7f, 0x40, 0xfd, 0x3, 0x20, 0x0, 0x20, 0xa3, 0xff, 0x8}], 0x3}) syz_kvm_setup_cpu$x86(r7, r5, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) openat(r6, &(0x7f00000000c0)='./file1\x00', 0x0, 0x4) [ 832.305260][T18525] EXT4-fs (loop3): Can't read superblock on 2nd try [ 832.410345][T18525] loop3: detected capacity change from 0 to 4 [ 832.434380][T18525] EXT4-fs (loop3): Test dummy encryption mode enabled [ 832.458692][T18525] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x18, 0x0, 0x0, 0x0) 11:47:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c600000000000000950000020000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x4, &(0x7f0000000140)=[{&(0x7f00000000c0)="1e793f452efbe800f08ca206be01e8cb8a7f5d833a89882e2e91ff1d82983c3d7d7cb86d744d09dfba8d894beb6572139bc679eb68331394f06062289c2882", 0x3f, 0x7ff}, {&(0x7f0000000340)="64b767f713a9d2c59e3d47f454abb7b5e12b6b6c710d990367eff1ff7ff28d80cd665b02665525fa786db9367e77c081596e69ccffecd34c4c93376cc8c08688020c06f8514dedaee8ecdeaac7597867e028cb71d43893303e0000df2dca4a6f3bb1eb9be92e97a9772e0c43925db5c6a56f4dda79485ae9da3465c8acc7f77c0b792f19d1f58c5ff9fd00f97f98fa1c2b597f9d0d4ca662adbf70dfe15bcc260aeaae4141e3d1bcd461695767f625905ca5dcb2590b5db74d60f2b2be7101dce7f121b4d309111a4a7716a2e903e1fe7f8e47d25a35487ff1303ac4814f01d230716ffa", 0xe4, 0x100000000}, {&(0x7f0000000440)="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", 0x1000, 0x1}, {&(0x7f0000001440)="2e8e282b2695ed3a765eb6abb0bef15325920b86ade06ac99cef21bb9bc32d47b546494bd8838d87cf265bfcc479f1516093acfa40c10c62f58d2c80e8006f65a3bd2aecb4709648c334a7677cd8fefefb6d9c2e9a8264d90082ea4efe63b86d3a6506ef94b584567db652ce252c7476aec3fe6db346db0f5ebec40b52d18e0eef7eb4f6e006f7a2998200f03e78aac1fccbbfdaf4ad07e206d93e6aa992d8629179adff7d96b23b8ee6d90accfb71e72f9f7753806df81a11c0969016f43e6889803f438627ca7ddfb6cfb4", 0xcc, 0x401}], 0x216404, &(0x7f0000001540)={[{@nombcache}, {@init_itable}, {@noblock_validity}, {@data_err_ignore}, {@grpid}], [{@obj_user={'obj_user', 0x3d, 'test_dummy_encryption'}}, {@fsmagic={'fsmagic', 0x3d, 0x100000000}}, {@subj_user={'subj_user', 0x3d, 'test_dummy_encryption'}}, {@subj_role={'subj_role', 0x3d, ',\\)-()*'}}, {@subj_user={'subj_user', 0x3d, 'test_dummy_encryption'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ext4\x00'}}]}) 11:47:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300005000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6d626c40fb696f5f7303006d6974307783c359d631ee227a9cc8c68ede2c00"]) umount2(&(0x7f0000000040)='./file0\x00', 0x3) [ 832.781933][T18580] loop3: detected capacity change from 0 to 4 [ 832.813300][T18580] EXT4-fs (loop3): Test dummy encryption mode enabled [ 832.849147][T18580] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = fanotify_init(0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r3, 0x105, 0x4000103b, r4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000040)={0x101ff, 0x1, 0x5000, 0x2000, &(0x7f0000020000/0x2000)=nil}) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r5 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x10, 0x0, 0x0) 11:47:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300006000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0xf, 0x0, 0x0, 0x0) 11:47:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x80000400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) creat(&(0x7f0000000040)='./file0\x00', 0x20) r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x81, 0x10800) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x200) chdir(&(0x7f0000000080)='./file0\x00') 11:47:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 833.216249][T18607] loop3: detected capacity change from 0 to 4 11:47:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c60000000000000095000002000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 833.309901][T18607] EXT4-fs (loop3): Test dummy encryption mode enabled [ 833.376303][T18607] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:29 executing program 5: r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0f78a9365bf30f38f6cc6766c7442400a7b4d4626766c7442402000000006766c744240600000000670f011424660f380b07f30fc7340f20d86635080000000f22d8baf80c66b80631298d66efbafc0cec66b80500000066b92a0000000f01c1f0fe8e0080f4", 0x66}], 0x1, 0x37, &(0x7f0000000140)=[@efer={0x2, 0x2801}], 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 833.451258][T18607] loop3: detected capacity change from 0 to 4 11:47:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r4 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x2d00, 0xbe) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 11:47:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) [ 833.502308][T18607] EXT4-fs (loop3): Test dummy encryption mode enabled [ 833.523121][T18607] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300007000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:29 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x400, &(0x7f0000000300)=ANY=[@ANYBLOB="74657374c964756d6d795f656efaffffffffffffff2c00"]) 11:47:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 833.835068][T18666] loop3: detected capacity change from 0 to 4 11:47:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 833.925814][T18666] EXT4-fs (loop3): Test dummy encryption mode enabled [ 833.965429][T18666] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fanotify_init(0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r2, 0x105, 0x4000103b, r3, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f00000000c0)={r1}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x4) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000000)=0x8) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 834.068034][T18666] loop3: detected capacity change from 0 to 4 [ 834.085889][T18666] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x10007, &(0x7f0000000300)=ANY=[@ANYBLOB="746573745f64756d6d795f656e63727970743110e25d8a"]) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = memfd_create(&(0x7f0000000080)='\x00', 0x5) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x1800, 0x0) setsockopt$PNPIPE_ENCAP(r5, 0x113, 0x1, &(0x7f00000001c0), 0x4) fchown(r2, r1, r4) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)='./file1\x00', r1, r6) [ 834.131757][T18666] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300008000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 834.470465][T18715] loop3: detected capacity change from 0 to 4 [ 834.522920][T18715] EXT4-fs (loop3): Test dummy encryption mode enabled [ 834.586540][T18715] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:30 executing program 5: r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x40}, @timestamp, @mss={0x2, 0x8}, @timestamp], 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:30 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 11:47:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300006000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 834.634814][T18715] loop3: detected capacity change from 0 to 4 [ 834.673580][T18715] EXT4-fs (loop3): Test dummy encryption mode enabled [ 834.706331][T18715] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300009000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 834.815527][T18739] loop0: detected capacity change from 0 to 4 11:47:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x1091, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x809030, &(0x7f0000000040)=ANY=[@ANYRESHEX=r1, @ANYRESHEX, @ANYRES64=0x0]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 834.940395][T18739] EXT4-fs (loop0): Test dummy encryption mode enabled [ 834.972082][T18739] EXT4-fs (loop0): Can't read superblock on 2nd try [ 835.028862][T18757] loop3: detected capacity change from 0 to 4 11:47:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r2, 0x105, 0x4000103b, r3, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0), 0x201000, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xffffffffffffffff}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0xa0d38499bae64d31}}, {@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}], [{@uid_gt={'uid>', 0xee00}}, {@audit}]}}) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newqdisc={0x24, 0x24, 0x100, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x7, 0xf}, {0xfffa, 0x2}, {0x5, 0xa}}}, 0x24}}, 0x0) 11:47:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 835.092847][T18757] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 835.146497][T18757] EXT4-fs (loop3): Can't read superblock on 2nd try [ 835.242275][T18757] loop3: detected capacity change from 0 to 4 [ 835.259186][ T25] kauditd_printk_skb: 5 callbacks suppressed [ 835.259201][ T25] audit: type=1804 audit(1635162451.390:489): pid=18765 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir066864975/syzkaller.Wn01Uz/825/file0" dev="sda1" ino=15200 res=1 errno=0 [ 835.326296][T18757] EXT4-fs (loop3): Test dummy encryption mode enabled [ 835.367529][T18757] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 835.408788][ T25] audit: type=1804 audit(1635162451.540:490): pid=18765 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir066864975/syzkaller.Wn01Uz/825/file0" dev="sda1" ino=15200 res=1 errno=0 11:47:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000a000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) openat(r3, &(0x7f0000000040)='./file0\x00', 0x74d801, 0x0) [ 835.604847][T18805] loop3: detected capacity change from 0 to 4 [ 835.624846][T18805] EXT4-fs (loop3): Test dummy encryption mode enabled [ 835.634039][T18805] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x40000000400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 11:47:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 835.708128][T18805] loop3: detected capacity change from 0 to 4 [ 835.728301][T18805] EXT4-fs (loop3): Test dummy encryption mode enabled [ 835.749070][T18805] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000b000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 836.067268][T18843] loop3: detected capacity change from 0 to 4 [ 836.128284][T18843] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 11:47:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000004000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:32 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x82201, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x2, 0x80, 0x20], 0x3, 0x800, 0x0, 0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) close(0xffffffffffffffff) fanotify_init(0x0, 0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x1009, r6, 0x0) r7 = fanotify_init(0x0, 0x0) r8 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r7, 0x105, 0x4000103b, r8, 0x0) fanotify_mark(r6, 0x1, 0x1011, r8, &(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x201080, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=r3, @ANYRESDEC=r8]) r9 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r9, r5, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 836.181730][T18843] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 836.281091][T18843] loop3: detected capacity change from 0 to 4 [ 836.316274][T18843] EXT4-fs (loop3): Test dummy encryption mode enabled [ 836.364508][T18843] EXT4-fs (loop3): Can't read superblock on 2nd try [ 836.404011][T18862] loop0: detected capacity change from 0 to 4 11:47:32 executing program 5: r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(r1, 0x4140, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, &(0x7f00000001c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573746c5f64756d6d795f656e6372797074696f6e2c00b00e4828152b01282dc5cd9143c7fc3f6b07f540622f6a848d4b7e69ea9549617048da9b7fdf59384bac45938c2ec0c98a986018f75c9ddca7a718d1f885421c0bff6c4a18857e9deb81"]) lchown(&(0x7f0000000080)='./file1\x00', 0xffffffffffffffff, 0x0) syz_usbip_server_init(0x4) 11:47:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000c000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 836.489714][T18862] EXT4-fs (loop0): Test dummy encryption mode enabled [ 836.526412][T18862] EXT4-fs (loop0): Can't read superblock on 2nd try 11:47:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r4 = fanotify_init(0x0, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r4, 0x105, 0x4000103b, r5, 0x0) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000022000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000200)="b805000000b9001800000f01c1b828a7ea880f23c80f21f8350400c0000f23f80fc75c7300afb9800000c00f3235004000000f300f32260f01d866bad104edb805000000b9750000000f01d90f32", 0x4e}], 0x1, 0x8, &(0x7f00000002c0), 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) ioctl$KVM_CAP_X86_DISABLE_EXITS(r3, 0x4068aea3, &(0x7f0000000180)={0x8f, 0x0, 0x1}) r7 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r7, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 11:47:32 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x82201, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x2, 0x80, 0x20], 0x3, 0x800, 0x0, 0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) close(0xffffffffffffffff) fanotify_init(0x0, 0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x1009, r6, 0x0) r7 = fanotify_init(0x0, 0x0) r8 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r7, 0x105, 0x4000103b, r8, 0x0) fanotify_mark(r6, 0x1, 0x1011, r8, &(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x201080, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=r3, @ANYRESDEC=r8]) r9 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r9, r5, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 11:47:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 836.723003][T18889] loop3: detected capacity change from 0 to 4 [ 836.783878][T18889] EXT4-fs (loop3): Test dummy encryption mode enabled [ 836.821650][T18889] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 836.929366][T18889] loop3: detected capacity change from 0 to 4 [ 836.978398][T18889] EXT4-fs (loop3): Test dummy encryption mode enabled [ 837.021348][T18889] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0xffff}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) 11:47:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000d000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x0, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 11:47:33 executing program 5: r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000001800)=ANY=[@ANYRES16=r1]) r2 = fanotify_init(0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r2, 0x105, 0x4000103b, r3, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) creat(&(0x7f0000000080)='./file0\x00', 0x2f) creat(&(0x7f0000000300)='./file0\x00', 0x48) syz_mount_image$xfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x3, 0x9, &(0x7f0000001700)=[{&(0x7f0000000140)="854ec13e6deeea4769c31268e587950d64e7c9d5facb3aa70590e2ad1e96d60daf552e4056cf307147d34850e86336f88b7b4f42ba531c9faf9ef1fb12eae43a41ba3a3c93edc87e865512f31e9b063242c9434f3a4739ccddb706ce13b378fb62bb5903ed1098d520ab9a4ed5e9a23359a694b75e87f17bedc69747b9ddb02ee70166b897d747bceedebd80f8850761d5dda6d8639634ec3b7c6c6f76f6e41b3a7465b99f553c73b35d0e295d6a0fc846a9767bb4377842514b1b798edbd47c", 0xc0, 0x8000}, {&(0x7f0000000240)="b3c9d885005085ea0e16cde269091375421d24ac22f247434a4c4abc9191657d1a01e62489a52566558c189fb6a06ffeb540cd899dc711bc21682cf0f0d40867aebeca70a46a88e2a9898b7e4382d1b2efd9670b04453d10", 0x58, 0x5}, {&(0x7f0000000340)="bceecbc5e8984e969094b9a0ab0b84acc00876404a628c7bcd25599a61f0bd928f0a4a31da725ad86374cf43ecbd9aa29e0343eac78536af4f4672b1eb57fca4feb36b7223586d9660a7aecc701c81989d2cf1bdc0276f588352ccf275cdb0e72111ef9c4af4443ff7b1275105a3368e5787a7d1fc351303def22a6d5145b2cbeb74c8aeb4bf00724fd6e5b4e98c7cb8cf19be0c72e2b29e1bcf8717ed8520e92284a68cc37f876d2ca2b624181900fef6a024a2a602becbab73dde6a21d2bdaa9", 0xc1, 0x5}, {&(0x7f0000000440)="4b46e3192006224223f9c2cf1e3df4200ec3af3ca536dd9b778cbf08fa8705d0ab81774f4dc6fd57102e91a047afba5f1189eefa1ab5af14516443ba71c6ed85ecaed2cd9d8c025a6b6715b03a66752394d3d83a551f53c031c2df15881fdee76d605db79104998598634124ac0c32df2725b23d32d6040366b06b28715c939b97191b6d7d25ff0235e1618a09fa661dec8fe7059ba18ec96be67dda20f720fbd4d3948746926d6086120c01872f2e85fa32ee", 0xb3, 0x7d7}, {&(0x7f0000000500)="026855cd224264b48a119083f242dc612dba632da8dad2c481619c646a6893f514150b45af86e69edf000db0b9cc606973ad6f6e935b4dfc5fd6efdcb3201d27ae6493a9514b417dd70a6657152148a442390f27b1ff836f5c7ad5a031231f392e063ac9853e64731d782fe7", 0x6c, 0xffffffffffffc3ed}, {&(0x7f0000000580)="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", 0x1000, 0x1}, {&(0x7f0000001580)="33b90f3f075b2cdc3d1f4b3f617073026bfa770eba7c9b81275ecf0d0e5a927b86334b790755aa8659575ffb202654ef27fe0f993e027bb5e61c8bc3d8f7cfe28eac38fd8324c5aa90e2c336f3d83ef84c0a1c9a218ee71eef84ffccc4071d7f350513e75d707edf8ee0fb62f35fe4af64f4bd6d0099de02b8a434a05054318e25a718a93635c795e00bc22d8c5377d9dad9bce6756738a6a74ba6ca", 0x9c}, {&(0x7f0000001640)="88f1f0ce878332ad440475efde0f44764bf68132cd152c2cd2fc6db78f6f5260d8b1f31d894ae2aa37324449c61395950f4fb6f1199426b25ef9abfb99ad4dff8deab653c2cf5c32f7e0bffd1250b39d61a8314d3080732fafed409699d5090f8e84ca54ec996bd240acd48c4be06ea6e2a23de1e154bedbbffa9963e29445d4378b28f7b509f010ccfb03e3ac1785c358dd9617992d3a917b4a628222312fb75da506dfddca32b226b4a072543e7c9a228f20b7a29969a8941c093831", 0xbd, 0x6}, {&(0x7f00000002c0)="e58ce6784f00bc9ca5f5935bea9fef2383afc13abcd2d182150ff3f4343ad2c1cea3f2186a702843eb890f9bdeac", 0x2e, 0xfffffffffffff0d4}], 0x1000010, &(0x7f0000001900)=ANY=[@ANYBLOB="7071756f74612c646f6e745f6d6561737572652c61707072616973652c7365636c6162656c2c7375626a5f726f6c653d7d2c7375626a5f757365723d746573745f64756d6d795f656e6372797074696f6e2c0041799881556de1c3c2e82a003193b8754bd676be509ed69a25622b83bbf8f1043751f86260f076296c0c5b28a17c4dffa75729c52d5887e49037974e1df30f7add43f31062a42a831a9a2d86b8e1191d27cc81712c6e9664fca8cdc7a84a51c9643dbf10bd900025a7cf675e87cb6b5fdde17bd76ff82042be"]) 11:47:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0xffff}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 837.410949][T18944] loop3: detected capacity change from 0 to 4 11:47:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 837.468435][T18944] EXT4-fs (loop3): Test dummy encryption mode enabled [ 837.503956][T18944] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) chdir(&(0x7f0000000040)='./file1\x00') [ 837.591307][T18944] loop3: detected capacity change from 0 to 4 [ 837.623853][T18944] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 837.677809][T18944] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001d00)={0x0, @remote, @empty}, &(0x7f0000001d40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001ec0)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000001fc0)=0xe8) mount$overlay(0x0, &(0x7f0000005500)='./file0\x00', &(0x7f0000005540), 0x2, &(0x7f0000005580)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_off}, {@xino_on}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@metacopy_off}, {@workdir={'workdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}], [{@appraise_type}, {@appraise}, {@context={'context', 0x3d, 'unconfined_u'}}, {@measure}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_gt={'uid>', r4}}, {@subj_type={'subj_type', 0x3d, '\xff\xff\xff\xff\xff\xff'}}, {@hash}]}) sendmmsg(r1, &(0x7f0000005280)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="7531c6e2af4d7097923a9ad429345fcdc085ec1a208f01b4b1957719326a54a7bf8d0dd22f41645b990ad34f8fb9f81f1914b82a074b4023a8cd1a5594613cac676886085d093cd912212fcb759803f38e6c0cf3bb", 0x55}, {&(0x7f0000000140)="cae4c420086044d468293582fc0936b65011dd49fde7dc7d436d8519415731152d5919e4c6ed562b3dd33238db18d14805bd8e133a174800157304f3498666817657f6b0794832328798c291996c7d02eca117f7c29fbdef79a09674a0e45fb5843bbf0860234ad22c992f5a92d608b348", 0x71}], 0x2, &(0x7f0000000340)=[{0xa0, 0x110, 0x1000, "cf40be3963ac908a93350015d257c707a2a8a9b344fc771e2a7b19d75a9f626c92beabbc59e22858d49684bb5e6afcf581f3cc16e6c97734ed35ae05818491daee632df9eb0c0b7acfd59c6f081965772f472e416fd660e0c82c0da438d7bfc66c6527454c0ce948fd24ecdc3b1cf86a64ee8b8c697d9d1d266ab41f0b746611465b46e82634dd4debf5abee7167"}, {0x110, 0x110, 0x200, "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"}], 0x1b0}}, {{&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3, 0x3, {0xa, 0x4e20, 0x21e7b99, @private0, 0x101}}}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000500)="cff53449b66f5a2a286f67e70845711ea1bd8c9066eea0538c1c775283fe31284abc66104f327ed56f53310e15255c83af52b1f2694c9aa80aad393e60061efd2c36a3a3512c3d053f42f39d5a39d5e608579f903c", 0x55}, {&(0x7f0000000580)="93154f6029997f8214cad6b8457eb5949df2de03cc8f01e20786d5f97070ee7a9c21385239ce00f100b78a93e5b65f7840578297f04a1d4571ee2f9ecfb591f3c4e0131f4ea9537e4a4b2c37880e048e832a6ca7fda8cdc5bb03283dbac048fdf2cee8fe56fa5c79da1b7c28ffd0736f4718e5e3ea4b10e37b99ff713a3b4149440a7ac35d87de55bfecaf443cc703cd68498cc5950ef5821e4239b69861a5e15cc5abfe5a4f0b75f6680e3914f76fce753553543da433d5fbd5c08af8496fceec5a2e460bae9686bf9b68515b3ad208d476a2d57dfb8258e0894b3ad506e457637c82ce1bf49cc14773", 0xea}, {&(0x7f0000000680)="e31dcb45d01d9338f0b60bd13118aad547d3af63f093e8fd9b90958abc404bc30aa34d0ab5842037380075fccfeecc64e8b52dacd9bfffa1c12c197cb1ef0c211486532d74ffc8194049bd4b71d72e382864080060afcfccbf5bb345443be67022d4065ec454296411b5bd31b8be7f52ed5164967e43b4b9235ebb9e70a9b1ce23a3dd795c78e7be88c0b056dd769f5278fbf99a17018e588609ba17a14a8b871428c7bd01ec9158", 0xa8}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="9acc998204ff2ee197c9b18faff3f8236bff6735b560477f49d42d1e1a8e2862e339e18ac0a1e2436c4f754c38b1258f9dfbf2151d3090bf16011d3eb34ed5139fec1a3b913cb35801315ef0e766fba8e57a7abb4e3a2930f124ac8929179fac4af44895d494c8821934414d8afb13f9ecd22e055e1ad6a99ee2afa68affc81e0127724685c9c3e533c90eac935325167e291b05738646ecd467409be3fc67d9999a25b80baae1ecf1c88752954ddccd4e65f2fd", 0xb4}, {&(0x7f00000001c0)="aa9e79d87e2d28d35e230190fc1c3fd98d89d221ec47f259c7f64d0d0bf1", 0x1e}, {&(0x7f0000001800)="a2ce4096fc64513a0b8aaacb08f5679adbdf6c6e3f5b84a88dbcd86af37a78200dd68caa1c33a5f537ee56844110932c1c345a40c6cd41edfcfc295339a704928e2f34ef069896a775621cd1a2a9c8b393fbc452fffaf9a6ca416b02edef643534bcb539912412a6f18e483e0a808c9eb1376bdc5bfb00aa2f0edc0ae7652c1727a73c4505684223595ef2f65835ca943be6d1cc262972e0dff8f21c218f047e710bf9d97a1fba5ec889eb59da7a54", 0xaf}], 0x7, &(0x7f0000001940)=[{0x70, 0x1, 0x6, "e6167aa0310350a182d0280995358aa1dd4fa555b59bf1d84c7efd95ed7965a8e41995d5cfe41060bcd84139acdde3a650111688b4926fefb9d03bc4c952faaba4701f685c98b77abdecfe5a90b6c3025c7b3381d1af8560e9ad"}, {0x58, 0x84, 0x0, "dc834a2b6a9308e3c6238f0b7dd69728b187f4461fe5b1864073e8363f8aacd9365e647b990a6950819c7634fa9f8c8cd416de4288452dd32dc5acf5ef00fa80077a6e00"}, {0xb0, 0x10e, 0x8, "d5279127c05ce0773200a4210298bd49d814cc0d47893343b09b77c991e10a1546c4e0d836eb39fe8cae22c093a757a0b514686904ec5a4e8c561ac082b2be04d370cde758328b9fae585abb9e09896a396b9d3393a0430b420217370553979a6e7cd290f338087d790e830ff0d9db067f977a62241af0eb2b488a360e393dad9baf0911329b5bcfd12e0bdae242c026bbb46a6439f9ee81ef3d"}], 0x178}}, {{&(0x7f0000001ac0)=@vsock={0x28, 0x0, 0x2710}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000001b40)="e3027d83acbb3688a26707e8114a695c5087016d6621fa4c7282580c63d5e07847615648b8210fd49b8135a18905226ef343d587d0700476181735ab584aac6ef3d1609d8fa767e4664f2e5a14addaa7da7f385ed790b5ea569bd66073e9ae5b08b827536106029b07bbe3fd1dd1dc8f866d6aeefaa643a95176f548264d0e567531ac97a01cca880fa8d5f315c73c84cfa502113f9236511f54480f2dbb03e653f4579786c370a22339082d8320e9579e46a0e6a2faa9891609eba30910ef9b44b67111f441edb9c4b195230ed6", 0xce}], 0x1, &(0x7f0000001c40)=[{0x60, 0x109, 0x72a3, "4462cc0a407c5230c9412b0cba03eaacbb162e9ab7f734bdbc15c3d00a57596f2852ad0b07ae968096ef088756820dc71bf6ec97b20e4d98852ef81da2d9ea97e85ae5747ad20e0613e248"}, {0x48, 0x3a, 0x4, "2c5e7120eb2435c81179bef2aab80c28827b1474968074cd63d208986d4d6117619204e317e720dee07596880fadc1a14c79224b"}], 0xa8}}, {{&(0x7f0000001d80)=@ll={0x11, 0x10, r2, 0x1, 0x20, 0x6, @broadcast}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001e00)="2bad53ada2e718c0c5b3490dd5176a149b7cecd1585082b1a3d3c7be3481374ba05bc37e2d3f127fea7df3a5a7530a784acb2feddf0061899eebc1e83bb8f2622ad5f8ea9243324be02d3ba2d54b02ff88926e59fa", 0x55}], 0x1}}, {{&(0x7f0000002000)=@ll={0x11, 0x8, r3, 0x1, 0xc0, 0x6, @broadcast}, 0x80, &(0x7f0000002140)=[{&(0x7f0000002080)="28f68160049df89d7b6a55c5420d022d1a056cda1849ba164494056fa6a2e7299f05c6737fc7f4da8313a26faa890c4bb3ae91526370b91f618ae88ce8166f1f98dca08f99020a6740e2e7a448c103f07bcae9b2e012aea1eb9aead10dd2971ba74b1ed0322949d1e710101b27c346c695ceaba7db2f8b179ba3ba34376cf2411f5a68d1f66f14d2e40516937d4ddba8fde58ad7059d5910dae9216342f075b97db943f69199ac002b02ea01ab58731fd8d22201cfad2d8847cba63edf", 0xbd}], 0x1, 0xfffffffffffffffd}}, {{&(0x7f0000002180)=@l2={0x1f, 0x7, @any, 0x3, 0x1}, 0x80, &(0x7f0000002280)=[{&(0x7f0000002200)="f9e9b963f877ce586d5e5babd47ca836967ede9c2f0a0225376e7d3d0ccb31e0851fdc8f284f6c8f33d2336ea5df7c13fc8c14930a542b4fff8ad331e12469148d93e232dc", 0x45}], 0x1, &(0x7f00000022c0)=[{0x70, 0x1, 0x2, "60e56671e4adecf5d03ac044bfad12393c4f1ee2ecfdb9d58ddfbb4b564e1c74358f259f841cd42b355cacaae6f37233baededef53df419ae083523f34eed9c998d7319de05b6b1d499f69c1aa1cc0322ccd848bed36c95aa8de20"}], 0x70}}, {{&(0x7f0000002340)=@l2tp6={0xa, 0x0, 0x7ff, @private2, 0x9}, 0x80, &(0x7f00000024c0)=[{&(0x7f00000023c0)="f17d284b38c5d4f559d164da21d60630340fd9c38c4e257bbf71724a7bac6e0170ec3349f1224c7d80758b32c63a4cf28bb0937bd263174df9393517aa209e2d11aa7f174185a46fd872f627c04e008718308170f7c837a76fba1e99d0495f1f989fc60d1bf513e23d4a7d39d5cc5c145d16b27ecc3d6608f2ecfe07da0ffb58bfdfc26018098fd0fdbb7a5e08e9e3ff3a885aa9f972020ad5b98b3fe4c6f836ac0af535ea", 0xa5}, {&(0x7f0000002480)="ee7340d8ae5e8cc469dea3187a", 0xd}], 0x2, &(0x7f0000002500)=[{0x20, 0xff, 0x41, "5c9f4c5e6a89ef041e5d9d47"}], 0x20}}, {{&(0x7f0000002540)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x80, &(0x7f0000003800)=[{&(0x7f00000025c0)="f64346ce3c2f14f9827d08393183587ebf21cfbaa99904d0b577efcdd22933edd76fe963415a0019eadd1a27313a6be979908b67fa590b5cef9ca5f0340c4b20d7174420f4ea4f95eb118d1d1926aa37869c14a668805e158d9cdbdd5c28364e1ed790c627f9203ec04adfc40c1c477aae07fbcbe35932fa5eec91b6ecb85afb01b21a1b831b503c567f42dc1f687d77e867634605ec159d553d03a6c522", 0x9e}, {&(0x7f0000002680)="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", 0x1000}, {&(0x7f0000003680)="5c2bc869481ee85106a1a72f15b5cc11cccae75e0c0a9dcfb2bfdfab24defa217a6be92a2d25c7a79c7415565d4aaf13be7547b93ed327f8788cb845c421d5475e6a7a9547de9c69373aeca15c34963916fa42b257a6a60dec5de9b88711d3ba2db4211f2d1c2ff103476337de8bedce7bf9a1d68fd45229284ca19778aea624db12fb12ac08484e0197fe343022ed2621127bd4c1584a421aa839b3d5f44cd8f823fe8894479490fa0a740609b98e621784d59764516b506f7f96a93813c4", 0xbf}, {&(0x7f0000003740)="21ff187c1e43e06c8fe9f54c2d35195071ba7723e3262959babe52e1ee26b8e7e7029f5fec8e42446c85319495da2a94bffb9d152ecb98b4e384637a5bbe8340835e05706d7deecd5253944e19f1259a28055f36d5e5f7f4770061e43337fb9bdc2aadd5494e011b2d5ff390cf0192880668dffd164aee2de4a938d490e2337ed20bf7c2da88eb7121d9bff9738412ccf65b479d9b9cd9b1e196accb16cbc597117039df3a7ab50e87d3345cd46300af54e54991098bf93875a2dab0f1e82eb5", 0xc0}], 0x4, &(0x7f0000003840)=[{0x10, 0x1f9, 0x1}, {0x80, 0x10e, 0x1, "50eb399e472e8e60a7d5b6825237b3bc1a6e69bc82208e7aa872054cc6423dd23231892eb1bb3cfa9b9a031aaef2a016ccdf60f9c55b94c8608884bffe2d56e9a536b6398ff417810c465b3d7868d50b938429779540f9e663d9b759960ce667076af40bb3e7b13d69042d9b"}, {0x98, 0x0, 0x1, "33e92c1e2c7045de07135c3940bcc2fe6ae035ec04cf03d8db9eb5bacd74d0bbac8495a77297bb06cac9a97842209ea4a6b317b0965054e4794cb8d0afda363f7a30efa13e81e1f74b79dde295adf51e7ad6afec3995baabb22f7d4fcee9d9810b1139a5ff0f8ed3ed8ac4b05d756e9b49ad14cd089d689f0820ad898ce7f927788fc7"}, {0xc0, 0x88, 0x20, "d8a6fd4291edfd00364e53277d9f5bbe744abd52aa1c1ab931c2a18b95680b9212f4e1a3d0bfa6e43ef0e3f60e4484415dc484499c31024fde148d3ceef2dcce87b4de0b7b30bd73d422a3c19e5ab4c1233bac120651cf448121636dab08fe0ef9926436d3584e02cf20abd4842b160acb64cf804971bd84edd4f88097d0f1723da616105577e62f97c0f53a152027be615d566e77307155356c7078df4e8d6f6dd1da502d5b561c1e8025872cb9c5"}, {0xf8, 0x10c, 0x7, "32923dde6ad8e095754f15e696b68142dc7fb1d87d72d7a3f4c425b00866f4ad3b82300fd7d552b87f215c28d2e3b8c7a77d6df72f2f80665d2436ff3e297728987ca4bf55824241c4132ca0ac816b9311834c64cd6fe9e9b8e078f8a074d1349222b6272df340080654484ce391bc94e2b489ba4ac581182e495d88f3998d2ea51b046372241e33bb88ea32e21c3a394433f171ec72dd25bc596f1fc3dffaf340738ffb3ca1e34f84e382c888a407f73e3bd2d7678b1f9d733ad63c1f1e903fa152dc5db3dcd146c6006983641faf2503a1d8e091964c0706079f951575148680652cf14eaf1bd6"}, {0x1010, 0x10d, 0xffffffff, "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"}, {0xf0, 0x10d, 0xffffff81, "84a4fd0e9c2cf83f178168c32ebee14d562546becaac9bfa59b802535b068ead3d8d850fe2ab33a2c2b797959fd59558d87953c847e880400c2293291873c5f0123de54272c12d82aa9b26c7a396b0813aa98ec24c6a59da8064ae5a5b33efd9d8a1726b5919ad6320a6c8cfa518ab04ff8d5b555b013d368ffd78dca978f54bfa40e875742757e0626ea9c6240d46a072c0cd7e3390bc8ee42c52678836164999b1f48629e4d136c42f10159802fa4ad0e326251677f3f2b7eadfb36702c88e0a347a615edda0ef66c85b771052205c24ffc97712b34d76c7cc3b24c5"}, {0x90, 0x115, 0xfff, "d2ccec4e0867fc3727ffcec5b81d551118e0c03299b87ee38e5bdedac8e5e0081a5960c2d95245521a573c879a710f157bfc2d5b42fb5e1bf21eea03b11775639e9501fe4df4ce28613a0377a9235b61500ab095882644eb5e3c42652ca68da05efe786487e3efc7637d41db86f12fd8bfd074d8900a7efea2d6d6ef4a"}], 0x1470}}, {{&(0x7f0000004cc0)=@can, 0x80, &(0x7f0000004fc0)=[{&(0x7f0000004d40)="344b5f3cda5c9a83406a989143bd5721d196ef3b23d3192d3356b74784dd03f2c6a8562e25ae353d942e60dde1b76925819d10903e245b61a6e79a03a1594d69814c5eae8bcc85c91d8353e348d497bf4c0e7c26b38d43364dd67c72d4b65100f9d087e798fe1d197ecbfb8e894766f8899bd36b7c7827dd11c2da0025766ff225573719fa6c949096daa09325a9157dacf74e831a0c0e22e6d90129292532961795abe13f46d22b8a44c90dde9e7d1eea9af7240cfaad6a", 0xb8}, {&(0x7f0000004e00)="17f5d6b6dc0a60276f4490b4ffc696e3c73e9cba26deaebbaf9a5ecf78df01dca757786f869b8742d62c31d9fe4787646893c4711a6dd4c508b04082ff32badd60a44461a1838a459ca78a98b1263f68921408e91a6467ed21f372f13958d6c3700a96859e0a51d6fc5eb7fd32a1f946c985691f75b3f42a01ca4c75d9d444b09a877079b68fda7890f4ec7eb69495c173a413c4a6822faf7e54539c2be2c9875370a42af2c08a450b242b6aecae432276b2bc2cc62750b1e95642c44127c56b6e", 0xc1}, {&(0x7f0000004f00)}, {&(0x7f0000004f40)="29b797cfdfaf13270c74b11afd99d6f78efc480b812c93912471774cce2cf4a0ea066ef9c07524af670b5ea3869174b88511a99abde27daaa1ee0ca7158fd13811bff1481e73", 0x46}], 0x4, &(0x7f0000005000)=[{0x58, 0x101, 0x3, "117d02082e921aef3e6a80defb04ccc87a1e01129780bf35b3564a4f81684bf185929bd899cdb782eb01f9b4dfe3da84ac6edd412e18f953c22e65529a00a93a3c8b"}, {0xd8, 0xff, 0x4, "88c34e72fe2287c17f1aaece47d9ebcab0df775b5c2f61ba85e80e2c02abfbfba42302c09bc04e69dec3ae3d5d476901d2c900d64a0c2f71e91c444dddccf8f1e26c8adbeed7dd967b5aca10c7c5fc88b0c668df3d599e42658aa654b5aef26e7e7fd7978c7f597087a24d25b97b463899d668dbf2308597ae2badcdff837fe535a51ac8ced59fb0e6746d450e0b1b3a71c69d93b12f0d4ca0213cc2b0a48061fb9f1d10c7b43bad79392a35739f9f2ba4a48e37182630351343ef4b4b0301c0cbdd2a11"}, {0x88, 0x29, 0xde, "2d7f1ed9d69c05da13c1a9e468496ee0fa62a791c3b11ce0a1a7ab550009eb94ac03f0d53217b7c803450ecf0a9f39c57a0a4439ee3c522de2e24c2dae74ea0f7f385dad417601889e2672263ece74730c870ca9345b77e91fee7cd29e1c19cfc0add443429af209463f67f39fffcaf3476f708a6ffc326e"}, {0x38, 0x1, 0x70ca6b34, "30b359eb65619666cf4e5eac2420dc6ffa97892f0f10742b62e7998049230d65539d212229bd9e6f"}, {0x68, 0x110, 0xfffffff7, "21cfc091a506ae94b4f96e64f9b7693739e5116f00cca67f7ceac9fe9dde516e17d4f8ee76ccd013e5f65fd509dc0018e78880fb0d29e5555b3b5d16c839584287f50a48e5daf94ec72635920235a5011938049332b0b862"}], 0x258}}], 0x9, 0x4000120) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000004f00)={{0x1, 0x1, 0x18, r0, {0x100}}, './file0\x00'}) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) fanotify_mark(r0, 0x20, 0x40000010, r5, &(0x7f00000054c0)='./file0\x00') 11:47:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000e000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0xffff}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fanotify_init(0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r2, 0x105, 0x4000103b, r3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r5 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r5, r4, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 11:47:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 837.983488][T18990] loop3: detected capacity change from 0 to 4 [ 837.995067][T18989] overlayfs: unrecognized mount option "appraise_type=imasig" or missing value [ 838.022195][T18990] EXT4-fs (loop3): Test dummy encryption mode enabled [ 838.039775][T18994] overlayfs: unrecognized mount option "appraise_type=imasig" or missing value [ 838.050808][T18990] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 838.138527][T18990] loop3: detected capacity change from 0 to 4 [ 838.161661][T18990] EXT4-fs (loop3): Test dummy encryption mode enabled [ 838.182172][T18990] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0xffff}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) setsockopt$sock_int(r3, 0x1, 0x2e, &(0x7f0000000400)=0x7, 0x4) connect$unix(r2, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r1}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000000e00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r5}, 0x10) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d60200400000000300030230000f000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) getresuid(&(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) read$FUSE(0xffffffffffffffff, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) fchown(0xffffffffffffffff, 0x0, r3) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004940)={{{@in=@local, @in=@dev={0xac, 0x14, 0x14, 0x21}, 0x4e23, 0x7b77, 0x4e21, 0x8, 0x2, 0x20, 0x0, 0x3b}, {0x7, 0x10000, 0x4572, 0x3ff, 0x6, 0x4, 0x100000000, 0xd6b2}, {0x80200000000000, 0x8, 0x7fff, 0x6}, 0x4, 0x6e6bba, 0x2, 0x1, 0x3, 0x2}, {{@in6=@private0, 0x4d2, 0x32}, 0x2, @in6=@private2, 0x3507, 0x3, 0x1, 0x1, 0x7fff, 0x1, 0x3}}, 0xe8) r4 = fanotify_init(0x0, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r4, 0x105, 0x4000103b, r5, 0x0) recvmmsg$unix(r5, &(0x7f0000004840)=[{{&(0x7f0000002580)=@abs, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000002600)=""/105, 0x69}], 0x1, &(0x7f0000002680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x168}}], 0x1, 0x10001, 0x0) setresuid(0x0, r2, 0x0) r6 = memfd_create(&(0x7f0000000080)='\x00', 0x5) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) fchown(r6, r2, r8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$smack_xattr_label(&(0x7f0000004880)='./file1\x00', &(0x7f00000048c0)='security.SMACK64\x00', &(0x7f0000004a40)=ANY=[@ANYBLOB="0000008e23c9ccbd8cde030000000000000026531aa52de76f3a3fc9705e457e89c2ad04ac411d40ed8dc398a0e29b0e00008c3c8d0191080899c7eaf4e0c92690129a6a6dd5d2cbc84c9e914aac7ede66acf9ea9e604b4479c5f0c7a4947aa3b92c3a340450222c29daa1e50e88f268c60459bceb41d6974b1bd4838bc02d5e15b99a9a3e87f9b15174e9ff65e3f995a1820ac05a"], 0x3, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x10, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r8}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9c}}, {}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions}], [{@fsmagic={'fsmagic', 0x3d, 0x3}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, 'ext4\x00'}}, {@audit}, {@dont_measure}, {@subj_user={'subj_user', 0x3d, 'test_dummy_encryption'}}, {@fowner_gt={'fowner>', r9}}, {@fowner_lt={'fowner<', 0xee01}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', r10}}]}}) 11:47:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000240)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x83, &(0x7f0000000200)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000040)={r6, 0xa9}, &(0x7f00000000c0)=0x8) r7 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r7, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 838.513373][T19032] loop3: detected capacity change from 0 to 4 11:47:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 838.589805][T19032] EXT4-fs (loop3): Test dummy encryption mode enabled [ 838.623556][T19032] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000140)="ed64f1e5b2ad26f9b1b391fb3fffb7e17c54487c5eb82b4ec7476b4137810b73b8ca11dc", 0x24, 0xd129}], 0x1202800, &(0x7f0000000040)={[{@dioread_nolock}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@appraise_type}, {@dont_measure}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fsmagic={'fsmagic', 0x3d, 0x10000}}, {@context={'context', 0x3d, 'root'}}, {@seclabel}, {@obj_role}]}) 11:47:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 838.724136][T19032] loop3: detected capacity change from 0 to 4 [ 838.771508][T19032] EXT4-fs (loop3): Test dummy encryption mode enabled [ 838.811503][T19032] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0xffff}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) setsockopt$sock_int(r3, 0x1, 0x2e, &(0x7f0000000400)=0x7, 0x4) connect$unix(r2, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r1}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000000e00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r6}, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000700)={r1, 0x2, 0x10eb, 0x200}) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300010000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x6180, 0xb) 11:47:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) syz_mount_image$jfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x6, 0x8, &(0x7f0000001680)=[{&(0x7f00000003c0)="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", 0x1000, 0x6ec}, {&(0x7f00000013c0)="c34ea39e96f893c9e3c81a55ea2751dfcfd6f55e0e398fde89941024e9a8145c96ae67258b642d289ce4e1310e76356c79163dde26ead97566d5fface68fea0bf353ad224a45ad04a07d8b0f906b6b59e74d7befbc422bc5b1ab3cf5cbf99d0d79ac071acb6f49c190cef78f9b2368c79da9bb7594a3f749", 0x78, 0x4}, {&(0x7f0000001440)="4ec1fa0803cdfd80eaabeb27f8658ade38dc3d563544186688b22093db2644c148b33515baabe0", 0x27, 0x6}, {&(0x7f0000001480)="7645ae2c77d45ce5237f45427190932c91cbc3cfc1ed034f4af769864af07c395b9a16787ebb767d23a1d7b8a03c3fc043", 0x31, 0x2}, {&(0x7f00000014c0)="d4d4c34a478e6c52185425283cb6852ef32655647993", 0x16, 0x6}, {&(0x7f0000001500)="d240ab886338e61594793b61e8a11b320aba7b330e951b13f167511feda588180dbaa3066c451255fdd778bdfe7c1772de8b44904c5ae2e1b659f54f7b23e64d59ce146ad87b188864493c68534a37838a03334a7e69aee22f2ad1df93d1a1e646b9d0709fb6f6b7ffafcad1c936", 0x6e, 0x2}, {&(0x7f0000001580)="15de42b16f677493fe79743495580053b07fadb9197ba3a23ec5dc7c7de7094a3eed6079495bfd529855f5f890d6ab1b3657261f3ac0d57971de3a6ad1a1442a63390a672151de015622eec9014b", 0x4e, 0x3}, {&(0x7f0000001600)="8551b48c8046571e8d0f8d7c3376e6543ed7c21477502681b0aaead030131c3bb0bd89cc26cc92942d302cae20b1ee69b6b3ccc88505790532f0e9534afac2d604751665de5644bb3007a4d00908b138d749000ba93767ae73cf6ac6193666cd365455ef2a5bd9ae834df7711bc41b83a8d387c0f7a92b5e7206", 0x7a, 0x8}], 0x0, &(0x7f0000001740)={[{@grpquota}], [{@smackfshat={'smackfshat', 0x3d, ')$!@'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@fsuuid={'fsuuid', 0x3d, {[0x54, 0x37, 0x35, 0x32, 0x61, 0x36, 0x34, 0x66], 0x2d, [0x66, 0x36, 0x33, 0x35], 0x2d, [0x66, 0x36, 0x35, 0x31], 0x2d, [0x61, 0xe9173e5ea69352c4, 0x34, 0x36], 0x2d, [0x32, 0x39c6bbba675b1c89, 0x33, 0x65, 0x39, 0x66, 0x39, 0x39]}}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@subj_type={'subj_type', 0x3d, '[^'}}, {@pcr={'pcr', 0x3d, 0x4}}, {@obj_type}]}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_mount_image$v7(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0x3f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="1ff3a86d280adb23d482ebebecdb3d2ae69557cd8a988f18a1b2b421d07e27747d5844e009d035582f2721ab54d4695d602b7d8f370b6867645bd1362fa0e5e0ad0acfb731b709930865050518f13806c0c5ddbf3fd36a7b30ee6e1b4a19e8b0f89fe49f6a38618159f6557ba81d65d9966dd3bdbe1a782740d0b2d903", 0x7d, 0x5}, {&(0x7f0000000200)="411c90524ebfc68f9ca08e6f7d4a8618a0656620c14cf400507cfe035743a101bfc4c129d3663c3f189f2ff4", 0x2c, 0x34ddee40}], 0x822002, &(0x7f00000002c0)={[{'/dev/kvm\x00'}, {'romfs\x00'}, {'@#'}, {'/dev/kvm\x00'}, {}, {'romfs\x00'}, {'romfs\x00'}, {'/dev/kvm\x00'}], [{@obj_user}, {@obj_role={'obj_role', 0x3d, 'romfs\x00'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) r4 = openat(r3, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 839.131223][T19079] loop3: detected capacity change from 0 to 4 11:47:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 839.196171][T19079] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0xffff}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) setsockopt$sock_int(r3, 0x1, 0x2e, &(0x7f0000000400)=0x7, 0x4) connect$unix(r2, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r1}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000000e00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r6}, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000700)={r1, 0x2, 0x10eb, 0x200}) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000740)=0x20) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:35 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/234, 0xea}], 0x1, &(0x7f0000000240)=""/106, 0x6a}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="3000000024001d0f3a61aa51acb1d59e1a43ca38", @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b000100636c73616374"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="240000006400110f00"/20, @ANYRES32=r5, @ANYBLOB="00000000f3ffffff"], 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002fc0)=@delchain={0x24, 0x11, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff3, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@newtfilter={0x3c, 0x2c, 0x1, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0x2, 0xfff2}, {0x1, 0xfff2}, {0xfff1, 0x2}}, [@TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_CHAIN={0x8, 0xb, 0x5}, @TCA_RATE={0x6, 0x5, {0xff, 0x1f}}]}, 0x3c}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 839.249573][T19079] EXT4-fs (loop3): Can't read superblock on 2nd try [ 839.329405][T19086] loop1: detected capacity change from 0 to 11 [ 839.358150][T19079] loop3: detected capacity change from 0 to 4 [ 839.360856][T19086] jfs: Unrecognized mount option "fscontext=root" or missing value 11:47:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 839.403216][T19079] EXT4-fs (loop3): Test dummy encryption mode enabled [ 839.441441][T19106] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 11:47:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0xffff}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) setsockopt$sock_int(r3, 0x1, 0x2e, &(0x7f0000000400)=0x7, 0x4) connect$unix(r2, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1, 0x0, 0x0, 0x40000}}], 0x53, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r1}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000000e00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_exit\x00', r6}, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000700)={r1, 0x2, 0x10eb, 0x200}) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000740)=0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xd, 0x9, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @ldst={0x0, 0x1, 0x0, 0x0, 0xb, 0xffffffffffffffff, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xa787}, @alu={0x4, 0x0, 0x2, 0x3, 0x4, 0x8, 0x21926229376d2f17}, @jmp={0x5, 0x0, 0xd, 0x6, 0x8, 0xfffffffffffffffe, 0xfffffffffffffffc}]}, &(0x7f00000004c0)='GPL\x00', 0x3, 0xb1, &(0x7f0000000500)=""/177, 0x41100, 0x3, '\x00', 0x0, 0x11, r5, 0x8, &(0x7f0000000600)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x6, 0x0, 0x451}, 0x10, 0xffffffffffffffff, r6}, 0x78) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 839.454014][T19079] EXT4-fs (loop3): Can't read superblock on 2nd try [ 839.481086][T19086] loop1: detected capacity change from 0 to 264192 11:47:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300011000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) [ 839.584748][T19106] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 11:47:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x111) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 11:47:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) (fail_nth: 1) [ 839.827991][T19157] loop3: detected capacity change from 0 to 4 [ 839.837861][T19112] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 839.862695][T19106] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 839.897226][T19157] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x0, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 839.938869][T19157] EXT4-fs (loop3): Can't read superblock on 2nd try [ 839.975150][T19164] FAULT_INJECTION: forcing a failure. [ 839.975150][T19164] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 839.995839][T19164] CPU: 1 PID: 19164 Comm: syz-executor.0 Not tainted 5.15.0-rc6-syzkaller #0 [ 840.004640][T19164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.014761][T19164] Call Trace: [ 840.018059][T19164] dump_stack_lvl+0x201/0x2d8 [ 840.022763][T19164] ? show_regs_print_info+0x12/0x12 [ 840.027979][T19164] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 840.033715][T19164] ? __might_fault+0xb8/0x110 [ 840.038835][T19164] should_fail+0x384/0x4b0 [ 840.043251][T19164] _copy_from_user+0x2d/0x170 [ 840.047922][T19164] __copy_msghdr_from_user+0xaf/0x730 [ 840.053471][T19164] ? __ia32_sys_shutdown+0x60/0x60 [ 840.058587][T19164] __sys_sendmmsg+0x3b7/0x800 [ 840.063264][T19164] ? __ia32_sys_sendmsg+0x90/0x90 [ 840.068323][T19164] ? rcu_read_lock_sched_held+0x89/0x130 [ 840.073968][T19164] ? __lock_acquire+0x2b00/0x2b00 [ 840.078990][T19164] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 840.084962][T19164] ? print_irqtrace_events+0x220/0x220 [ 840.090408][T19164] ? vtime_user_exit+0x2b2/0x3e0 [ 840.095427][T19164] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 840.101406][T19164] __x64_sys_sendmmsg+0x9c/0xb0 [ 840.106255][T19164] do_syscall_64+0x44/0xd0 [ 840.110677][T19164] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 840.116569][T19164] RIP: 0033:0x7f3d49240a39 [ 840.120985][T19164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:47:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)) 11:47:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 840.140580][T19164] RSP: 002b:00007f3d467b6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 840.148986][T19164] RAX: ffffffffffffffda RBX: 00007f3d49343f60 RCX: 00007f3d49240a39 [ 840.156945][T19164] RDX: 0000000000000001 RSI: 0000000020000300 RDI: 0000000000000006 [ 840.165100][T19164] RBP: 00007f3d467b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 840.173056][T19164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 840.181017][T19164] R13: 00007ffcc71bbb6f R14: 00007f3d467b6300 R15: 0000000000022000 [ 840.228325][T19157] loop3: detected capacity change from 0 to 4 [ 840.254933][T19157] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372f57074696f6e2c008d3c790a83a5a791935c4f57f435c2c23cb3a513df8ed79e3d6ac86baf28afb9ee76fce65de1753e174f6755a4b3f06337a351de68c43574e34afb132bc6ce4121fd9876ea0dcf3776c5c73dd1cb21bdc1209e5b599fe3adc61194d6577ebc94ebe5e803c9233578963f006b77463412bf452a79430e19e043c8476e8abd006890c531f283b53016eea943f93eb4d90f1712b09539444891b3252f7aa7a2d802e647b4f245fb7b"]) [ 840.292870][T19157] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300012000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) (fail_nth: 2) 11:47:36 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) openat2(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x4080, 0xc, 0xc}, 0x18) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x5}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="746573745f64756d6d000000f3ffffff7e637200007469"]) r1 = fanotify_init(0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r1, 0x105, 0x4000103b, r2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'vxcan1\x00'}) creat(&(0x7f0000000140)='./file0\x00', 0xd) [ 840.578319][T19203] loop3: detected capacity change from 0 to 4 [ 840.619208][T19203] EXT4-fs (loop3): Test dummy encryption mode enabled [ 840.637918][T19210] FAULT_INJECTION: forcing a failure. [ 840.637918][T19210] name failslab, interval 1, probability 0, space 0, times 0 [ 840.659381][T19203] EXT4-fs (loop3): Can't read superblock on 2nd try [ 840.681776][T19210] CPU: 0 PID: 19210 Comm: syz-executor.0 Not tainted 5.15.0-rc6-syzkaller #0 [ 840.690583][T19210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.700659][T19210] Call Trace: [ 840.703955][T19210] dump_stack_lvl+0x201/0x2d8 [ 840.708659][T19210] ? show_regs_print_info+0x12/0x12 [ 840.713877][T19210] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 840.719623][T19210] ? __might_sleep+0x110/0x110 [ 840.724412][T19210] should_fail+0x384/0x4b0 [ 840.728851][T19210] ? __alloc_skb+0xd8/0x580 [ 840.733365][T19210] should_failslab+0x5/0x20 [ 840.737881][T19210] kmem_cache_alloc_node+0x77/0x340 [ 840.743191][T19210] __alloc_skb+0xd8/0x580 [ 840.747525][T19210] alloc_skb_with_frags+0xab/0x660 [ 840.752684][T19210] ? rcu_read_lock_sched_held+0x89/0x130 [ 840.758315][T19210] sock_alloc_send_pskb+0x928/0xa60 [ 840.763524][T19210] ? sock_kzfree_s+0x50/0x50 [ 840.768109][T19210] ? do_raw_spin_unlock+0x134/0x8a0 [ 840.773315][T19210] unix_dgram_sendmsg+0x816/0x2a50 [ 840.778506][T19210] ? tomoyo_socket_sendmsg_permission+0x28b/0x410 [ 840.784988][T19210] ? tomoyo_socket_bind_permission+0x360/0x360 [ 840.791139][T19210] ? __might_fault+0xb8/0x110 [ 840.795817][T19210] ? unix_dgram_poll+0x660/0x660 [ 840.800751][T19210] ? iovec_from_user+0x5d/0x390 [ 840.805591][T19210] ? __import_iovec+0x35f/0x500 [ 840.810457][T19210] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 840.815896][T19210] ? security_socket_sendmsg+0x9d/0xb0 [ 840.821346][T19210] ? unix_dgram_poll+0x660/0x660 [ 840.826271][T19210] ____sys_sendmsg+0x5b9/0x910 [ 840.831033][T19210] ? __sys_sendmsg_sock+0x30/0x30 [ 840.836058][T19210] __sys_sendmmsg+0x57e/0x800 [ 840.840736][T19210] ? __ia32_sys_sendmsg+0x90/0x90 [ 840.845780][T19210] ? rcu_read_lock_sched_held+0x89/0x130 [ 840.851422][T19210] ? __lock_acquire+0x2b00/0x2b00 [ 840.856449][T19210] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 840.862421][T19210] ? print_irqtrace_events+0x220/0x220 [ 840.867931][T19210] ? vtime_user_exit+0x2b2/0x3e0 [ 840.872877][T19210] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 840.878852][T19210] __x64_sys_sendmmsg+0x9c/0xb0 [ 840.883801][T19210] do_syscall_64+0x44/0xd0 [ 840.888219][T19210] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 840.894117][T19210] RIP: 0033:0x7f3d49240a39 [ 840.898538][T19210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 840.918132][T19210] RSP: 002b:00007f3d467b6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 11:47:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 840.926547][T19210] RAX: ffffffffffffffda RBX: 00007f3d49343f60 RCX: 00007f3d49240a39 [ 840.934507][T19210] RDX: 0000000000000001 RSI: 0000000020000300 RDI: 0000000000000006 [ 840.942551][T19210] RBP: 00007f3d467b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 840.950507][T19210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 840.958477][T19210] R13: 00007ffcc71bbb6f R14: 00007f3d467b6300 R15: 0000000000022000 11:47:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x1, 0x10000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 11:47:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 841.033478][T19203] loop3: detected capacity change from 0 to 4 [ 841.067154][T19203] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:37 executing program 5: ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000180)=@usbdevfs_driver={0x9, 0x40000000, &(0x7f0000000140)}) r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r0, 0x105, 0x4000103b, r1, 0x0) r2 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000140)=0x60, 0x1800) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000001c0)={r2, 0x4, 0xc2d6, 0x9}) io_submit(0x0, 0x0, &(0x7f00000002c0)) r3 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) syz_open_dev$binderN(&(0x7f00000001c0), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) fanotify_init(0x0, 0x0) syz_usbip_server_init(0x4) r4 = dup(r3) write$6lowpan_enable(r4, &(0x7f0000000000)='0', 0xfffffd2c) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1fe}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) r6 = fanotify_init(0x0, 0x0) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r6, 0x105, 0x4000103b, r7, 0x0) getpeername(r7, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f00000000c0)=0x80) [ 841.095756][T19203] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300018000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) (fail_nth: 3) [ 841.342140][T19245] loop3: detected capacity change from 0 to 4 [ 841.369758][T19245] EXT4-fs (loop3): Test dummy encryption mode enabled [ 841.396239][T19245] EXT4-fs (loop3): Can't read superblock on 2nd try [ 841.470132][T19245] loop3: detected capacity change from 0 to 4 [ 841.494451][T19245] EXT4-fs (loop3): Test dummy encryption mode enabled 11:47:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 841.517299][T19259] FAULT_INJECTION: forcing a failure. [ 841.517299][T19259] name failslab, interval 1, probability 0, space 0, times 0 11:47:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = fanotify_init(0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r3, 0x105, 0x4000103b, r4, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000006000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000180)="b946080000b800709d6dba21280a330f3066ba4300b01dee0f0f098e0f001f0f06f30f090f936e360fc75856f30f017100660f38ddcf", 0x36}], 0x1, 0x71, &(0x7f0000000200)=[@cstype3={0x5, 0xb}], 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) r6 = fanotify_init(0x0, 0x0) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r6, 0x105, 0x4000103b, r7, 0x0) fsconfig$FSCONFIG_SET_FLAG(r7, 0x0, &(0x7f0000000040)='nolazytime\x00', 0x0, 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r8 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r8, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 841.565109][T19245] EXT4-fs (loop3): Can't read superblock on 2nd try [ 841.610209][T19259] CPU: 1 PID: 19259 Comm: syz-executor.0 Not tainted 5.15.0-rc6-syzkaller #0 [ 841.619022][T19259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.629093][T19259] Call Trace: [ 841.632385][T19259] dump_stack_lvl+0x201/0x2d8 [ 841.637084][T19259] ? show_regs_print_info+0x12/0x12 [ 841.642300][T19259] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 841.648040][T19259] ? __might_sleep+0x110/0x110 [ 841.652824][T19259] should_fail+0x384/0x4b0 [ 841.657241][T19259] ? alloc_skb_with_frags+0xab/0x660 [ 841.662524][T19259] should_failslab+0x5/0x20 [ 841.667018][T19259] __kmalloc_node_track_caller+0x97/0x3e0 [ 841.672730][T19259] ? trace_kmem_cache_alloc_node+0x2e/0xe0 [ 841.678533][T19259] ? kmem_cache_alloc_node+0x250/0x340 [ 841.683990][T19259] ? __alloc_skb+0xd8/0x580 [ 841.688488][T19259] ? alloc_skb_with_frags+0xab/0x660 [ 841.693764][T19259] __alloc_skb+0x127/0x580 [ 841.698177][T19259] alloc_skb_with_frags+0xab/0x660 [ 841.703280][T19259] ? rcu_read_lock_sched_held+0x89/0x130 [ 841.708925][T19259] sock_alloc_send_pskb+0x928/0xa60 [ 841.714131][T19259] ? sock_kzfree_s+0x50/0x50 [ 841.718713][T19259] ? do_raw_spin_unlock+0x134/0x8a0 [ 841.723905][T19259] unix_dgram_sendmsg+0x816/0x2a50 [ 841.729020][T19259] ? tomoyo_socket_sendmsg_permission+0x28b/0x410 [ 841.735429][T19259] ? tomoyo_socket_bind_permission+0x360/0x360 [ 841.741580][T19259] ? __might_fault+0xb8/0x110 [ 841.746248][T19259] ? unix_dgram_poll+0x660/0x660 [ 841.751178][T19259] ? iovec_from_user+0x5d/0x390 [ 841.756016][T19259] ? __import_iovec+0x35f/0x500 [ 841.760857][T19259] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 841.766151][T19259] ? security_socket_sendmsg+0x9d/0xb0 [ 841.771686][T19259] ? unix_dgram_poll+0x660/0x660 [ 841.776614][T19259] ____sys_sendmsg+0x5b9/0x910 [ 841.781390][T19259] ? __sys_sendmsg_sock+0x30/0x30 [ 841.786424][T19259] __sys_sendmmsg+0x57e/0x800 [ 841.791100][T19259] ? __ia32_sys_sendmsg+0x90/0x90 [ 841.796143][T19259] ? rcu_read_lock_sched_held+0x89/0x130 [ 841.801788][T19259] ? __lock_acquire+0x2b00/0x2b00 [ 841.806812][T19259] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 841.812781][T19259] ? print_irqtrace_events+0x220/0x220 [ 841.818223][T19259] ? vtime_user_exit+0x2b2/0x3e0 [ 841.823185][T19259] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 841.829165][T19259] __x64_sys_sendmmsg+0x9c/0xb0 [ 841.834195][T19259] do_syscall_64+0x44/0xd0 [ 841.838605][T19259] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 841.844510][T19259] RIP: 0033:0x7f3d49240a39 [ 841.848918][T19259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.868684][T19259] RSP: 002b:00007f3d467b6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 841.877097][T19259] RAX: ffffffffffffffda RBX: 00007f3d49343f60 RCX: 00007f3d49240a39 [ 841.885145][T19259] RDX: 0000000000000001 RSI: 0000000020000300 RDI: 0000000000000006 [ 841.893126][T19259] RBP: 00007f3d467b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 841.901094][T19259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.909058][T19259] R13: 00007ffcc71bbb6f R14: 00007f3d467b6300 R15: 0000000000022000 11:47:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300021000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@test_dummy_encryption}, {@nodiscard}, {@data_err_ignore}], [{@smackfsdef={'smackfsdef', 0x3d, '(\\\xf2$'}}, {@audit}]}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x2000440, &(0x7f0000000240)={[{@xino_auto}, {@nfs_export_off}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@metacopy_off}, {@upperdir={'upperdir', 0x3d, './file0'}}], [{@smackfsdef={'smackfsdef', 0x3d, 'data_err=ignore'}}, {@smackfshat={'smackfshat', 0x3d, '\x92,-!-'}}, {@appraise}, {@dont_measure}]}) open(&(0x7f0000000380)='./file0\x00', 0x101101, 0x101) mount$cgroup2(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x800, &(0x7f0000000300)={[{@subsystem='cpu'}, {@memory_localevents}, {}, {@memory_localevents}, {}], [{@appraise_type}, {@obj_type={'obj_type', 0x3d, '-'}}]}) 11:47:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) (fail_nth: 4) [ 842.115340][T19280] loop3: detected capacity change from 0 to 4 [ 842.182545][T19280] EXT4-fs (loop3): Test dummy encryption mode enabled [ 842.215461][T19280] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) chdir(&(0x7f0000000040)='./file1\x00') [ 842.301767][T19296] FAULT_INJECTION: forcing a failure. [ 842.301767][T19296] name failslab, interval 1, probability 0, space 0, times 0 [ 842.341185][T19280] loop3: detected capacity change from 0 to 4 [ 842.374022][T19280] EXT4-fs (loop3): Test dummy encryption mode enabled [ 842.383491][T19296] CPU: 1 PID: 19296 Comm: syz-executor.0 Not tainted 5.15.0-rc6-syzkaller #0 [ 842.392316][T19296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.402385][T19296] Call Trace: [ 842.405687][T19296] dump_stack_lvl+0x201/0x2d8 [ 842.410376][T19296] ? show_regs_print_info+0x12/0x12 [ 842.415585][T19296] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 842.421386][T19296] ? unix_read_sock+0xd4/0x370 [ 842.426158][T19296] ? __mutex_lock_common+0x411/0x2550 [ 842.431524][T19296] should_fail+0x384/0x4b0 [ 842.435937][T19296] ? skb_clone+0x1b4/0x360 [ 842.440358][T19296] should_failslab+0x5/0x20 [ 842.444862][T19296] kmem_cache_alloc+0x74/0x300 [ 842.449623][T19296] skb_clone+0x1b4/0x360 [ 842.454126][T19296] sk_psock_verdict_recv+0x68/0x670 [ 842.459391][T19296] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 842.465367][T19296] unix_read_sock+0x130/0x370 [ 842.470037][T19296] ? sk_psock_verdict_apply+0x6a0/0x6a0 [ 842.475572][T19296] ? unix_stream_splice_actor+0x100/0x100 [ 842.481281][T19296] ? unix_stream_splice_actor+0x100/0x100 [ 842.486986][T19296] sk_psock_verdict_data_ready+0x166/0x1e0 [ 842.492782][T19296] ? sk_psock_start_verdict+0xf0/0xf0 [ 842.498138][T19296] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 842.504023][T19296] ? do_raw_spin_unlock+0x134/0x8a0 [ 842.509210][T19296] ? skb_queue_tail+0x32/0x120 [ 842.513981][T19296] unix_dgram_sendmsg+0x19cc/0x2a50 [ 842.519192][T19296] ? unix_dgram_poll+0x660/0x660 [ 842.524120][T19296] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 842.530176][T19296] ? iovec_from_user+0x5d/0x390 [ 842.535020][T19296] ? __import_iovec+0x35f/0x500 [ 842.539874][T19296] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 842.545154][T19296] ? security_socket_sendmsg+0x9d/0xb0 [ 842.550621][T19296] ? unix_dgram_poll+0x660/0x660 [ 842.555547][T19296] ____sys_sendmsg+0x5b9/0x910 [ 842.560314][T19296] ? __sys_sendmsg_sock+0x30/0x30 [ 842.565379][T19296] __sys_sendmmsg+0x57e/0x800 [ 842.570153][T19296] ? __ia32_sys_sendmsg+0x90/0x90 [ 842.575196][T19296] ? rcu_read_lock_sched_held+0x89/0x130 [ 842.580842][T19296] ? __lock_acquire+0x2b00/0x2b00 [ 842.585865][T19296] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 842.591844][T19296] ? print_irqtrace_events+0x220/0x220 [ 842.597289][T19296] ? vtime_user_exit+0x2b2/0x3e0 [ 842.602394][T19296] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 842.608371][T19296] __x64_sys_sendmmsg+0x9c/0xb0 [ 842.613215][T19296] do_syscall_64+0x44/0xd0 [ 842.617709][T19296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 842.623590][T19296] RIP: 0033:0x7f3d49240a39 [ 842.628007][T19296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 842.647621][T19296] RSP: 002b:00007f3d467b6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 842.656028][T19296] RAX: ffffffffffffffda RBX: 00007f3d49343f60 RCX: 00007f3d49240a39 [ 842.663991][T19296] RDX: 0000000000000001 RSI: 0000000020000300 RDI: 0000000000000006 [ 842.671947][T19296] RBP: 00007f3d467b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 842.679911][T19296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 842.687868][T19296] R13: 00007ffcc71bbb6f R14: 00007f3d467b6300 R15: 0000000000022000 11:47:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000240)=ANY=[@ANYBLOB="0501070000000200010044996b3e8b1cc30bfd5e91fd01bcd5c6cdee594680217fa63961262fa9104cf5a0f8db824b6bc796c6243925a1355398ecf26f1c52b4d47e2f4b31f31b839963a05148c2eb01e9d8f83318a65a25ece154332deccfc89797494025aaf55c32a9852523f00f7f5d821c396cb7d1d03b57aa026055f9b033d97dc0e8225d0d77395d1ea28a51208471e6be909d41553ba1617f259cfeb70f54d0ce997e3aef234a17aa0fa41c2069ab76f1dd8ca4158075854498b7af4a"], 0x69, 0x3) [ 842.757916][T19280] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300022000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) 11:47:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) 11:47:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000001b00)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = fanotify_init(0x0, 0x0) creat(&(0x7f00000001c0)='./file0/../file0\x00', 0x11f) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fanotify_mark(r4, 0x105, 0x4000103b, r5, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="800300006500040029bd7000fedbdf250000e7ff", @ANYRES32=0x0, @ANYBLOB="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"], 0x380}, 0x1, 0x0, 0x0, 0x4001}, 0x4000) [ 842.965517][T19327] loop3: detected capacity change from 0 to 4 11:47:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@noquota}]}) 11:47:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) (fail_nth: 5) [ 843.022295][T19327] EXT4-fs (loop3): Test dummy encryption mode enabled [ 843.052110][T19327] EXT4-fs (loop3): Can't read superblock on 2nd try 11:47:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 843.128971][T19327] loop3: detected capacity change from 0 to 4 11:47:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 843.170647][T19327] EXT4-fs (loop3): Test dummy encryption mode enabled [ 843.202869][T19338] FAULT_INJECTION: forcing a failure. [ 843.202869][T19338] name failslab, interval 1, probability 0, space 0, times 0 11:47:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20d602004000000003000302300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@test_dummy_encryption}]}) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140)={0x0, 0xfb, 0x5c, 0x4, 0x9, "b11a8f3eaa7a55c991a6a577cd6bdab1", "4217dcb7c2b406ba5816be96c2eb9aabf45288332b7565002fb124ad6ac852cf3c52d2edc6e70d01218260339f26d9034bb0b4d616c85659ddfe455a6108f575bb064c8dfe3b4c"}, 0x5c, 0x3) [ 843.221003][T19327] EXT4-fs (loop3): Can't read superblock on 2nd try [ 843.254093][T19338] CPU: 0 PID: 19338 Comm: syz-executor.0 Not tainted 5.15.0-rc6-syzkaller #0 [ 843.262899][T19338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.272977][T19338] Call Trace: [ 843.276291][T19338] dump_stack_lvl+0x201/0x2d8 [ 843.280994][T19338] ? show_regs_print_info+0x12/0x12 [ 843.286211][T19338] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 843.291966][T19338] should_fail+0x384/0x4b0 [ 843.296520][T19338] ? sk_psock_verdict_apply+0x353/0x6a0 [ 843.302107][T19338] should_failslab+0x5/0x20 [ 843.306621][T19338] kmem_cache_alloc_trace+0x73/0x310 [ 843.311928][T19338] sk_psock_verdict_apply+0x353/0x6a0 [ 843.317327][T19338] sk_psock_verdict_recv+0x385/0x670 [ 843.322636][T19338] unix_read_sock+0x130/0x370 [ 843.327331][T19338] ? sk_psock_verdict_apply+0x6a0/0x6a0 [ 843.332890][T19338] ? unix_stream_splice_actor+0x100/0x100 [ 843.338631][T19338] ? unix_stream_splice_actor+0x100/0x100 [ 843.344369][T19338] sk_psock_verdict_data_ready+0x166/0x1e0 [ 843.350191][T19338] ? sk_psock_start_verdict+0xf0/0xf0 [ 843.355581][T19338] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 843.361505][T19338] ? do_raw_spin_unlock+0x134/0x8a0 [ 843.366726][T19338] ? skb_queue_tail+0x32/0x120 [ 843.371515][T19338] unix_dgram_sendmsg+0x19cc/0x2a50 [ 843.376782][T19338] ? unix_dgram_poll+0x660/0x660 [ 843.381740][T19338] ? iovec_from_user+0x5d/0x390 [ 843.386608][T19338] ? __import_iovec+0x35f/0x500 [ 843.391474][T19338] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 843.396778][T19338] ? security_socket_sendmsg+0x9d/0xb0 [ 843.402253][T19338] ? unix_dgram_poll+0x660/0x660 [ 843.407205][T19338] ____sys_sendmsg+0x5b9/0x910 [ 843.412012][T19338] ? __sys_sendmsg_sock+0x30/0x30 [ 843.417076][T19338] __sys_sendmmsg+0x57e/0x800 [ 843.421792][T19338] ? __ia32_sys_sendmsg+0x90/0x90 [ 843.426882][T19338] ? rcu_read_lock_sched_held+0x89/0x130 [ 843.432565][T19338] ? __lock_acquire+0x2b00/0x2b00 [ 843.437624][T19338] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 843.443628][T19338] ? print_irqtrace_events+0x220/0x220 [ 843.449104][T19338] ? vtime_user_exit+0x2b2/0x3e0 [ 843.454072][T19338] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 843.460079][T19338] __x64_sys_sendmmsg+0x9c/0xb0 [ 843.464973][T19338] do_syscall_64+0x44/0xd0 [ 843.469505][T19338] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 843.475414][T19338] RIP: 0033:0x7f3d49240a39 [ 843.479848][T19338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 843.499469][T19338] RSP: 002b:00007f3d467b6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 843.507906][T19338] RAX: ffffffffffffffda RBX: 00007f3d49343f60 RCX: 00007f3d49240a39 11:47:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r1 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r1}, 0x20) bind$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="cd32173c0e95f01997dd01980a", 0xd}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 843.515894][T19338] RDX: 0000000000000001 RSI: 0000000020000300 RDI: 0000000000000006 [ 843.523880][T19338] RBP: 00007f3d467b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 843.531883][T19338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 843.539956][T19338] R13: 00007ffcc71bbb6f R14: 00007f3d467b6300 R15: 0000000000022000 11:47:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110580000000000c6000000000000009500000200000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x187}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x12, 0x4, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x5}, 0x10) r2 = socket(0x1, 0x803, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f00000000c0)=@udp=r2}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/13, 0xd}], 0x1}, 0x2) [ 843.638199][T19337] ================================================================== [ 843.646575][T19337] BUG: KASAN: use-after-free in consume_skb+0x27/0x110 [ 843.653529][T19337] Read of size 4 at addr ffff88807cbb75dc by task syz-executor.0/19337 [ 843.661861][T19337] [ 843.664189][T19337] CPU: 1 PID: 19337 Comm: syz-executor.0 Not tainted 5.15.0-rc6-syzkaller #0 [ 843.672944][T19337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.683007][T19337] Call Trace: [ 843.686286][T19337] dump_stack_lvl+0x1dc/0x2d8 [ 843.691056][T19337] ? show_regs_print_info+0x12/0x12 [ 843.696247][T19337] ? _printk+0xcf/0x118 [ 843.700401][T19337] ? wake_up_klogd+0xb2/0xf0 [ 843.704978][T19337] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 843.710683][T19337] ? _raw_spin_lock_irqsave+0xdd/0x120 [ 843.716140][T19337] print_address_description+0x66/0x3e0 [ 843.721762][T19337] ? consume_skb+0x27/0x110 [ 843.726284][T19337] kasan_report+0x19a/0x1f0 [ 843.730783][T19337] ? consume_skb+0x27/0x110 [ 843.735283][T19337] kasan_check_range+0x2b5/0x2f0 [ 843.740211][T19337] consume_skb+0x27/0x110 [ 843.744539][T19337] __sk_msg_free+0x672/0x710 [ 843.749119][T19337] ? rcu_lock_release+0x5/0x20 [ 843.753874][T19337] ? skb_dequeue+0x10e/0x140 [ 843.758451][T19337] ? sk_psock_stop+0xed/0x4a0 [ 843.763120][T19337] sk_psock_stop+0x3f5/0x4a0 [ 843.767714][T19337] ? unix_peer_get+0xe0/0xe0 [ 843.772366][T19337] sock_map_close+0x4a5/0x720 [ 843.777042][T19337] ? sock_map_remove_links+0x5a0/0x5a0 [ 843.782494][T19337] ? down_write+0x10f/0x170 [ 843.786987][T19337] ? down_read_killable+0x80/0x80 [ 843.792025][T19337] unix_release+0x7e/0xc0 [ 843.796347][T19337] sock_close+0xd8/0x260 [ 843.800579][T19337] ? sock_mmap+0x90/0x90 [ 843.804808][T19337] __fput+0x3fe/0x870 [ 843.808785][T19337] task_work_run+0x146/0x1c0 [ 843.813437][T19337] exit_to_user_mode_prepare+0x209/0x220 [ 843.819083][T19337] ? trace_irq_disable_rcuidle+0x11/0x170 [ 843.824942][T19337] syscall_exit_to_user_mode+0x2e/0x70 [ 843.830477][T19337] do_syscall_64+0x53/0xd0 [ 843.834884][T19337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 843.840763][T19337] RIP: 0033:0x7f3d491f367b [ 843.845168][T19337] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 843.864774][T19337] RSP: 002b:00007ffcc71bbbd0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 843.873189][T19337] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007f3d491f367b [ 843.881254][T19337] RDX: 0000000000000000 RSI: ffffffff848922fb RDI: 0000000000000005 [ 843.889212][T19337] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b30322ee8 [ 843.897262][T19337] R10: 0000000000000a6c R11: 0000000000000293 R12: 00007f3d49344b60 [ 843.905222][T19337] R13: 00007f3d49344b60 R14: 00007f3d49343f60 R15: 00000000000cddb4 [ 843.913190][T19337] ? io_serial_in+0x1b/0xb0 [ 843.917934][T19337] [ 843.920243][T19337] Allocated by task 19338: [ 843.924642][T19337] __kasan_slab_alloc+0xb2/0xe0 [ 843.929477][T19337] kmem_cache_alloc+0x1c3/0x300 [ 843.934313][T19337] skb_clone+0x1b4/0x360 [ 843.938551][T19337] sk_psock_verdict_recv+0x68/0x670 [ 843.943782][T19337] unix_read_sock+0x130/0x370 [ 843.948453][T19337] sk_psock_verdict_data_ready+0x166/0x1e0 [ 843.954256][T19337] unix_dgram_sendmsg+0x19cc/0x2a50 [ 843.959454][T19337] ____sys_sendmsg+0x5b9/0x910 [ 843.964291][T19337] __sys_sendmmsg+0x57e/0x800 [ 843.968954][T19337] __x64_sys_sendmmsg+0x9c/0xb0 [ 843.973789][T19337] do_syscall_64+0x44/0xd0 [ 843.978211][T19337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 843.984089][T19337] [ 843.986403][T19337] Freed by task 8581: [ 843.990364][T19337] kasan_set_track+0x4c/0x80 [ 843.994949][T19337] kasan_set_free_info+0x1f/0x40 [ 843.999890][T19337] ____kasan_slab_free+0x10d/0x150 [ 844.005006][T19337] slab_free_freelist_hook+0x12e/0x1a0 [ 844.010457][T19337] kmem_cache_free+0x95/0x190 [ 844.015118][T19337] sk_psock_backlog+0xf00/0x1060 [ 844.020053][T19337] process_one_work+0x853/0x1140 [ 844.024976][T19337] worker_thread+0xac1/0x1320 [ 844.029659][T19337] kthread+0x453/0x480 [ 844.033778][T19337] ret_from_fork+0x1f/0x30 [ 844.038207][T19337] [ 844.040516][T19337] The buggy address belongs to the object at ffff88807cbb7500 [ 844.040516][T19337] which belongs to the cache skbuff_head_cache of size 232 [ 844.055080][T19337] The buggy address is located 220 bytes inside of [ 844.055080][T19337] 232-byte region [ffff88807cbb7500, ffff88807cbb75e8) [ 844.068495][T19337] The buggy address belongs to the page: [ 844.074110][T19337] page:ffffea0001f2edc0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7cbb7 [ 844.084257][T19337] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 844.091791][T19337] raw: 00fff00000000200 0000000000000000 0000000700000001 ffff8880165a2280 [ 844.100358][T19337] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 844.108922][T19337] page dumped because: kasan: bad access detected [ 844.115315][T19337] page_owner tracks the page as allocated [ 844.121015][T19337] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY), pid 8581, ts 772967905949, free_ts 772963479746 [ 844.137228][T19337] get_page_from_freelist+0x779/0xa30 [ 844.142587][T19337] __alloc_pages+0x255/0x580 [ 844.147161][T19337] allocate_slab+0xcc/0x4d0 [ 844.151664][T19337] ___slab_alloc+0x41e/0xc40 [ 844.156242][T19337] kmem_cache_alloc_node+0x2ad/0x340 [ 844.161516][T19337] __alloc_skb+0xd8/0x580 [ 844.165832][T19337] nsim_dev_trap_report_work+0x274/0xb20 [ 844.171523][T19337] process_one_work+0x853/0x1140 [ 844.176447][T19337] worker_thread+0xac1/0x1320 [ 844.181108][T19337] kthread+0x453/0x480 [ 844.185161][T19337] ret_from_fork+0x1f/0x30 [ 844.189564][T19337] page last free stack trace: [ 844.194220][T19337] free_pcp_prepare+0xc29/0xd20 [ 844.199056][T19337] free_unref_page_list+0x11f/0xa50 [ 844.204234][T19337] release_pages+0x18cb/0x1b00 [ 844.208983][T19337] tlb_flush_mmu+0x780/0x910 [ 844.213557][T19337] tlb_finish_mmu+0xcb/0x200 [ 844.218129][T19337] exit_mmap+0x3dd/0x6f0 [ 844.222355][T19337] __mmput+0x111/0x3a0 [ 844.226462][T19337] free_bprm+0x136/0x2f0 [ 844.230739][T19337] kernel_execve+0x740/0x9a0 [ 844.235313][T19337] call_usermodehelper_exec_async+0x262/0x3b0 [ 844.241369][T19337] ret_from_fork+0x1f/0x30 [ 844.245772][T19337] [ 844.248101][T19337] Memory state around the buggy address: [ 844.253721][T19337] ffff88807cbb7480: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 844.261763][T19337] ffff88807cbb7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 844.269805][T19337] >ffff88807cbb7580: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 844.277844][T19337] ^ [ 844.284768][T19337] ffff88807cbb7600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 844.292809][T19337] ffff88807cbb7680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 844.300852][T19337] ================================================================== [ 844.308999][T19337] Disabling lock debugging due to kernel taint [ 844.315225][T19337] Kernel panic - not syncing: panic_on_warn set ... [ 844.321808][T19337] CPU: 1 PID: 19337 Comm: syz-executor.0 Tainted: G B 5.15.0-rc6-syzkaller #0 [ 844.331956][T19337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.342010][T19337] Call Trace: [ 844.345293][T19337] dump_stack_lvl+0x1dc/0x2d8 [ 844.349985][T19337] ? show_regs_print_info+0x12/0x12 [ 844.355273][T19337] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 844.361008][T19337] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 844.367258][T19337] panic+0x2d6/0x810 [ 844.371157][T19337] ? trace_hardirqs_on+0x30/0x80 [ 844.376616][T19337] ? nmi_panic+0x90/0x90 [ 844.380856][T19337] ? _raw_spin_unlock_irqrestore+0xd4/0x130 [ 844.386750][T19337] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 844.392652][T19337] ? print_memory_metadata+0xe0/0x140 [ 844.398033][T19337] ? consume_skb+0x27/0x110 [ 844.402542][T19337] end_report+0x83/0x90 [ 844.406825][T19337] kasan_report+0x1bf/0x1f0 [ 844.411337][T19337] ? consume_skb+0x27/0x110 [ 844.415844][T19337] kasan_check_range+0x2b5/0x2f0 [ 844.420783][T19337] consume_skb+0x27/0x110 [ 844.425123][T19337] __sk_msg_free+0x672/0x710 [ 844.429715][T19337] ? rcu_lock_release+0x5/0x20 [ 844.434484][T19337] ? skb_dequeue+0x10e/0x140 [ 844.439076][T19337] ? sk_psock_stop+0xed/0x4a0 [ 844.443755][T19337] sk_psock_stop+0x3f5/0x4a0 [ 844.448349][T19337] ? unix_peer_get+0xe0/0xe0 [ 844.452947][T19337] sock_map_close+0x4a5/0x720 [ 844.457634][T19337] ? sock_map_remove_links+0x5a0/0x5a0 [ 844.463092][T19337] ? down_write+0x10f/0x170 [ 844.467597][T19337] ? down_read_killable+0x80/0x80 [ 844.472622][T19337] unix_release+0x7e/0xc0 [ 844.477037][T19337] sock_close+0xd8/0x260 [ 844.481285][T19337] ? sock_mmap+0x90/0x90 [ 844.485531][T19337] __fput+0x3fe/0x870 [ 844.489505][T19337] task_work_run+0x146/0x1c0 [ 844.494080][T19337] exit_to_user_mode_prepare+0x209/0x220 [ 844.499696][T19337] ? trace_irq_disable_rcuidle+0x11/0x170 [ 844.505396][T19337] syscall_exit_to_user_mode+0x2e/0x70 [ 844.510836][T19337] do_syscall_64+0x53/0xd0 [ 844.515251][T19337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 844.521125][T19337] RIP: 0033:0x7f3d491f367b [ 844.525524][T19337] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 844.545110][T19337] RSP: 002b:00007ffcc71bbbd0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 844.553515][T19337] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007f3d491f367b [ 844.561470][T19337] RDX: 0000000000000000 RSI: ffffffff848922fb RDI: 0000000000000005 [ 844.569422][T19337] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b30322ee8 [ 844.577372][T19337] R10: 0000000000000a6c R11: 0000000000000293 R12: 00007f3d49344b60 [ 844.585323][T19337] R13: 00007f3d49344b60 R14: 00007f3d49343f60 R15: 00000000000cddb4 [ 844.595276][T19337] ? io_serial_in+0x1b/0xb0 [ 844.599840][T19337] Kernel Offset: disabled [ 844.604146][T19337] Rebooting in 86400 seconds..