TRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() [ 1618.579780] FAULT_INJECTION: forcing a failure. [ 1618.579780] name failslab, interval 1, probability 0, space 0, times 0 [ 1618.581084] CPU: 1 PID: 9766 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1618.581798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1618.582682] Call Trace: [ 1618.582973] dump_stack+0x107/0x167 [ 1618.583376] should_fail.cold+0x5/0xa [ 1618.583786] ? create_object.isra.0+0x3a/0xa20 [ 1618.584278] should_failslab+0x5/0x20 [ 1618.584697] kmem_cache_alloc+0x5b/0x310 [ 1618.585124] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1618.585710] create_object.isra.0+0x3a/0xa20 [ 1618.586171] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1618.586707] kmem_cache_alloc+0x159/0x310 [ 1618.587152] security_file_alloc+0x34/0x170 [ 1618.587613] __alloc_file+0xb6/0x320 [ 1618.588011] alloc_empty_file+0x6d/0x170 [ 1618.588445] path_openat+0xe3/0x26f0 [ 1618.588863] ? path_lookupat+0x860/0x860 [ 1618.589294] ? perf_trace_lock+0xac/0x490 [ 1618.589741] ? SOFTIRQ_verbose+0x10/0x10 [ 1618.590175] ? __lockdep_reset_lock+0x180/0x180 [ 1618.590673] do_filp_open+0x190/0x3e0 [ 1618.591073] ? may_open_dev+0xf0/0xf0 [ 1618.591497] ? __alloc_fd+0x2b8/0x630 [ 1618.591903] ? lock_downgrade+0x6d0/0x6d0 [ 1618.592346] ? do_raw_spin_lock+0x121/0x260 [ 1618.592803] ? rwlock_bug.part.0+0x90/0x90 [ 1618.593266] ? _raw_spin_unlock+0x1a/0x30 [ 1618.593699] ? __alloc_fd+0x2b8/0x630 [ 1618.594122] do_sys_openat2+0x171/0x420 [ 1618.594547] ? build_open_flags+0x6f0/0x6f0 [ 1618.595010] ? rcu_read_lock_any_held+0x75/0xa0 [ 1618.595551] __x64_sys_openat+0x13f/0x1f0 [ 1618.595991] ? __ia32_sys_open+0x1c0/0x1c0 [ 1618.596447] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1618.596998] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1618.597557] do_syscall_64+0x33/0x40 [ 1618.597949] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1618.598487] RIP: 0033:0x7f105bfeba04 [ 1618.598882] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1618.600823] RSP: 002b:00007f10595aded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1618.601625] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105bfeba04 [ 1618.602376] RDX: 0000000000000002 RSI: 00007f10595ae000 RDI: 00000000ffffff9c [ 1618.603127] RBP: 00007f10595ae000 R08: 0000000000000000 R09: ffffffffffffffff [ 1618.603890] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1618.604626] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 03:52:13 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5460, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1618.626161] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:52:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) 03:52:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) 03:52:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) 03:52:25 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x15c) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:52:25 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 03:52:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 23) 03:52:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x300}]}, 0x1c}}, 0x0) 03:52:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4c, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:52:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d40000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:52:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) 03:52:25 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x40049409, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1631.044341] FAULT_INJECTION: forcing a failure. [ 1631.044341] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.047314] CPU: 1 PID: 9801 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1631.048711] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1631.050391] Call Trace: [ 1631.050940] dump_stack+0x107/0x167 [ 1631.051704] should_fail.cold+0x5/0xa [ 1631.052489] ? __kthread_create_on_node+0xd1/0x400 [ 1631.053488] should_failslab+0x5/0x20 [ 1631.054255] kmem_cache_alloc_trace+0x55/0x320 [ 1631.055171] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1631.056132] __kthread_create_on_node+0xd1/0x400 [ 1631.057099] ? __kthread_parkme+0x1d0/0x1d0 [ 1631.057984] ? __mutex_lock+0x4fe/0x10b0 [ 1631.058806] ? loop_configure+0xcb5/0x1480 [ 1631.059675] ? do_raw_spin_unlock+0x4f/0x220 [ 1631.060555] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1631.061510] kthread_create_on_node+0xbb/0x100 [ 1631.062423] ? __kthread_create_on_node+0x400/0x400 [ 1631.063447] ? lockdep_init_map_type+0x2c7/0x780 [ 1631.064401] ? lockdep_init_map_type+0x2c7/0x780 [ 1631.065360] loop_configure+0x3e3/0x1480 [ 1631.066196] lo_ioctl+0xa72/0x1760 [ 1631.066912] ? avc_has_extended_perms+0x7f1/0xf40 [ 1631.067890] ? loop_set_status_old+0x250/0x250 [ 1631.068809] ? avc_ss_reset+0x180/0x180 [ 1631.069606] ? lock_acquire+0x197/0x470 [ 1631.070410] ? find_held_lock+0x2c/0x110 [ 1631.071232] ? __lock_acquire+0xbb1/0x5b00 [ 1631.072149] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1631.073208] ? generic_block_fiemap+0x60/0x60 [ 1631.074114] ? loop_set_status_old+0x250/0x250 [ 1631.075030] blkdev_ioctl+0x291/0x710 [ 1631.075811] ? blkdev_common_ioctl+0x1870/0x1870 [ 1631.076766] ? selinux_file_ioctl+0xb6/0x270 [ 1631.077648] block_ioctl+0xf9/0x140 [ 1631.078378] ? blkdev_read_iter+0x1c0/0x1c0 [ 1631.079248] __x64_sys_ioctl+0x19a/0x210 [ 1631.080081] do_syscall_64+0x33/0x40 [ 1631.080829] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1631.081867] RIP: 0033:0x7f105c0388d7 [ 1631.082615] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1631.086261] RSP: 002b:00007f10595adf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1631.087795] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105c0388d7 [ 1631.089230] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1631.090660] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1631.092095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1631.093532] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 03:52:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 24) 03:52:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x345}]}, 0x1c}}, 0x0) 03:52:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) [ 1631.185302] FAULT_INJECTION: forcing a failure. [ 1631.185302] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.187745] CPU: 1 PID: 9817 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1631.189149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1631.190870] Call Trace: [ 1631.191444] dump_stack+0x107/0x167 [ 1631.192204] should_fail.cold+0x5/0xa [ 1631.192995] ? create_object.isra.0+0x3a/0xa20 [ 1631.193941] should_failslab+0x5/0x20 [ 1631.194735] kmem_cache_alloc+0x5b/0x310 [ 1631.195582] create_object.isra.0+0x3a/0xa20 [ 1631.196478] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1631.197515] kmem_cache_alloc_trace+0x151/0x320 [ 1631.198468] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1631.199441] __kthread_create_on_node+0xd1/0x400 [ 1631.200406] ? __kthread_parkme+0x1d0/0x1d0 [ 1631.201297] ? __mutex_lock+0x4fe/0x10b0 [ 1631.202128] ? loop_configure+0xcb5/0x1480 [ 1631.203000] ? do_raw_spin_unlock+0x4f/0x220 [ 1631.203909] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1631.204869] kthread_create_on_node+0xbb/0x100 [ 1631.205794] ? __kthread_create_on_node+0x400/0x400 [ 1631.206808] ? lockdep_init_map_type+0x2c7/0x780 [ 1631.207775] ? lockdep_init_map_type+0x2c7/0x780 [ 1631.208745] loop_configure+0x3e3/0x1480 [ 1631.209582] lo_ioctl+0xa72/0x1760 [ 1631.210304] ? avc_has_extended_perms+0x7f1/0xf40 [ 1631.211283] ? loop_set_status_old+0x250/0x250 [ 1631.212225] ? avc_ss_reset+0x180/0x180 [ 1631.213033] ? lock_acquire+0x197/0x470 [ 1631.213836] ? find_held_lock+0x2c/0x110 [ 1631.214670] ? __lock_acquire+0xbb1/0x5b00 [ 1631.215595] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1631.216654] ? generic_block_fiemap+0x60/0x60 [ 1631.217573] ? loop_set_status_old+0x250/0x250 [ 1631.218493] blkdev_ioctl+0x291/0x710 [ 1631.219263] ? blkdev_common_ioctl+0x1870/0x1870 [ 1631.220245] ? selinux_file_ioctl+0xb6/0x270 [ 1631.221142] block_ioctl+0xf9/0x140 [ 1631.221877] ? blkdev_read_iter+0x1c0/0x1c0 [ 1631.222752] __x64_sys_ioctl+0x19a/0x210 [ 1631.223599] do_syscall_64+0x33/0x40 [ 1631.224358] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1631.225400] RIP: 0033:0x7f105c0388d7 [ 1631.226146] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1631.229917] RSP: 002b:00007f10595adf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1631.231457] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105c0388d7 [ 1631.232911] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1631.234345] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1631.235778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1631.237211] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 03:52:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x900}]}, 0x1c}}, 0x0) 03:52:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) [ 1631.322738] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:52:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d40000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:52:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xa00}]}, 0x1c}}, 0x0) 03:52:41 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x15c) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:52:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 25) 03:52:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) 03:52:41 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 03:52:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x68, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:52:41 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x40086602, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1646.299853] FAULT_INJECTION: forcing a failure. [ 1646.299853] name failslab, interval 1, probability 0, space 0, times 0 [ 1646.301183] CPU: 0 PID: 9835 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1646.301916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1646.302824] Call Trace: [ 1646.303109] dump_stack+0x107/0x167 [ 1646.303485] should_fail.cold+0x5/0xa [ 1646.303895] ? __kernfs_new_node+0xd4/0x850 [ 1646.304343] should_failslab+0x5/0x20 [ 1646.304733] kmem_cache_alloc+0x5b/0x310 [ 1646.305152] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1646.305689] __kernfs_new_node+0xd4/0x850 [ 1646.306116] ? perf_trace_lock+0xac/0x490 [ 1646.306576] ? perf_trace_lock+0xac/0x490 [ 1646.307004] ? lock_chain_count+0x20/0x20 [ 1646.307458] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1646.307959] ? __lockdep_reset_lock+0x180/0x180 [ 1646.308435] ? __lockdep_reset_lock+0x180/0x180 [ 1646.308906] ? task_rq_lock+0xab/0x270 [ 1646.309342] ? lock_release+0x680/0x680 [ 1646.309749] ? find_held_lock+0x2c/0x110 [ 1646.310209] ? set_user_nice.part.0+0x2fd/0x760 [ 1646.310717] kernfs_create_dir_ns+0x9c/0x230 [ 1646.311209] internal_create_group+0x793/0xb30 [ 1646.311691] ? set_user_nice.part.0+0x2fd/0x760 [ 1646.312194] ? sysfs_remove_group+0x170/0x170 [ 1646.312677] ? lockdep_init_map_type+0x2c7/0x780 [ 1646.313211] ? blk_queue_flag_set+0x22/0x30 [ 1646.313681] ? __loop_update_dio+0x2d2/0x690 [ 1646.314161] loop_configure+0x954/0x1480 [ 1646.314613] lo_ioctl+0xa72/0x1760 [ 1646.315004] ? avc_has_extended_perms+0x7f1/0xf40 [ 1646.315521] ? loop_set_status_old+0x250/0x250 [ 1646.316022] ? avc_ss_reset+0x180/0x180 [ 1646.316451] ? lock_acquire+0x197/0x470 [ 1646.316881] ? find_held_lock+0x2c/0x110 [ 1646.317322] ? __lock_acquire+0xbb1/0x5b00 [ 1646.317805] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1646.318381] ? generic_block_fiemap+0x60/0x60 [ 1646.318879] ? loop_set_status_old+0x250/0x250 [ 1646.319377] blkdev_ioctl+0x291/0x710 [ 1646.319795] ? blkdev_common_ioctl+0x1870/0x1870 [ 1646.320307] ? selinux_file_ioctl+0xb6/0x270 [ 1646.320798] block_ioctl+0xf9/0x140 [ 1646.321211] ? blkdev_read_iter+0x1c0/0x1c0 [ 1646.321677] __x64_sys_ioctl+0x19a/0x210 [ 1646.322116] do_syscall_64+0x33/0x40 [ 1646.322520] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1646.323074] RIP: 0033:0x7f105c0388d7 [ 1646.323474] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1646.325450] RSP: 002b:00007f10595adf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1646.326273] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105c0388d7 [ 1646.327061] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1646.327839] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1646.328615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1646.329390] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1646.333684] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:52:41 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x40087602, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1646.362075] blktrace: Concurrent blktraces are not allowed on sg0 03:52:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xf00}]}, 0x1c}}, 0x0) 03:52:41 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 03:52:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) 03:52:41 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:52:41 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1646.442130] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1646.509865] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:52:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x2000}]}, 0x1c}}, 0x0) 03:52:41 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:52:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d40000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:52:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) 03:52:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 26) [ 1646.642657] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1646.692422] FAULT_INJECTION: forcing a failure. [ 1646.692422] name failslab, interval 1, probability 0, space 0, times 0 [ 1646.694876] CPU: 0 PID: 9882 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1646.696274] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1646.697966] Call Trace: [ 1646.698530] dump_stack+0x107/0x167 [ 1646.699281] should_fail.cold+0x5/0xa [ 1646.700082] ? create_object.isra.0+0x3a/0xa20 [ 1646.701022] should_failslab+0x5/0x20 [ 1646.701800] kmem_cache_alloc+0x5b/0x310 [ 1646.702640] create_object.isra.0+0x3a/0xa20 [ 1646.703538] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1646.704580] kmem_cache_alloc+0x159/0x310 [ 1646.705428] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1646.706501] __kernfs_new_node+0xd4/0x850 [ 1646.707345] ? perf_trace_lock+0xac/0x490 [ 1646.708192] ? perf_trace_lock+0xac/0x490 [ 1646.709099] ? lock_chain_count+0x20/0x20 [ 1646.710040] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1646.711116] ? __lockdep_reset_lock+0x180/0x180 [ 1646.712180] ? __lockdep_reset_lock+0x180/0x180 [ 1646.713246] ? update_load_avg+0x162/0x1870 [ 1646.714221] ? find_held_lock+0x2c/0x110 [ 1646.715149] ? set_user_nice.part.0+0x2fd/0x760 [ 1646.716219] kernfs_create_dir_ns+0x9c/0x230 [ 1646.717229] internal_create_group+0x793/0xb30 [ 1646.718283] ? set_user_nice.part.0+0x2fd/0x760 [ 1646.719269] ? sysfs_remove_group+0x170/0x170 [ 1646.720216] ? lockdep_init_map_type+0x2c7/0x780 [ 1646.721198] ? blk_queue_flag_set+0x22/0x30 [ 1646.722086] ? __loop_update_dio+0x2d2/0x690 [ 1646.722996] loop_configure+0x954/0x1480 [ 1646.723857] lo_ioctl+0xa72/0x1760 [ 1646.724596] ? avc_has_extended_perms+0x7f1/0xf40 [ 1646.725593] ? loop_set_status_old+0x250/0x250 [ 1646.726538] ? avc_ss_reset+0x180/0x180 [ 1646.727361] ? lock_acquire+0x197/0x470 [ 1646.728258] ? find_held_lock+0x2c/0x110 [ 1646.729206] ? __lock_acquire+0xbb1/0x5b00 [ 1646.730242] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1646.731443] ? generic_block_fiemap+0x60/0x60 [ 1646.732512] ? loop_set_status_old+0x250/0x250 [ 1646.733559] blkdev_ioctl+0x291/0x710 [ 1646.734440] ? blkdev_common_ioctl+0x1870/0x1870 [ 1646.735535] ? selinux_file_ioctl+0xb6/0x270 [ 1646.736560] block_ioctl+0xf9/0x140 [ 1646.737404] ? blkdev_read_iter+0x1c0/0x1c0 [ 1646.738338] __x64_sys_ioctl+0x19a/0x210 [ 1646.739189] do_syscall_64+0x33/0x40 [ 1646.739974] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1646.741037] RIP: 0033:0x7f105c0388d7 [ 1646.741815] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1646.745768] RSP: 002b:00007f10595adf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1646.747517] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105c0388d7 [ 1646.749160] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1646.750799] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1646.752445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1646.754081] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1646.761291] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:52:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:52:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x2a01}]}, 0x1c}}, 0x0) 03:52:55 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:52:55 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4020940d, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:52:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x6c, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:52:55 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:52:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 27) 03:52:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) [ 1661.013128] FAULT_INJECTION: forcing a failure. [ 1661.013128] name failslab, interval 1, probability 0, space 0, times 0 [ 1661.014854] CPU: 1 PID: 9895 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1661.015599] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1661.015842] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1661.016524] Call Trace: [ 1661.016578] dump_stack+0x107/0x167 [ 1661.018990] should_fail.cold+0x5/0xa [ 1661.019403] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1661.020028] should_failslab+0x5/0x20 [ 1661.020437] kmem_cache_alloc+0x5b/0x310 [ 1661.020888] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1661.021493] idr_get_free+0x4b5/0x8f0 [ 1661.021922] idr_alloc_u32+0x170/0x2d0 [ 1661.022344] ? __fprop_inc_percpu_max+0x130/0x130 [ 1661.022876] ? lock_acquire+0x197/0x470 [ 1661.023309] ? __kernfs_new_node+0xff/0x850 [ 1661.023798] idr_alloc_cyclic+0x102/0x230 [ 1661.024241] ? idr_alloc+0x130/0x130 [ 1661.024645] ? rwlock_bug.part.0+0x90/0x90 [ 1661.025139] __kernfs_new_node+0x117/0x850 [ 1661.025612] ? perf_trace_lock+0xac/0x490 [ 1661.026076] ? perf_trace_lock+0xac/0x490 [ 1661.026539] ? lock_chain_count+0x20/0x20 [ 1661.026998] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1661.027526] ? __lockdep_reset_lock+0x180/0x180 [ 1661.028054] ? __lockdep_reset_lock+0x180/0x180 [ 1661.028583] ? update_load_avg+0x162/0x1870 [ 1661.029059] ? find_held_lock+0x2c/0x110 [ 1661.029524] ? set_user_nice.part.0+0x2fd/0x760 [ 1661.030049] kernfs_create_dir_ns+0x9c/0x230 [ 1661.030545] internal_create_group+0x793/0xb30 [ 1661.031066] ? set_user_nice.part.0+0x2fd/0x760 [ 1661.031590] ? sysfs_remove_group+0x170/0x170 [ 1661.032094] ? lockdep_init_map_type+0x2c7/0x780 [ 1661.032638] ? blk_queue_flag_set+0x22/0x30 [ 1661.033122] ? __loop_update_dio+0x2d2/0x690 [ 1661.033621] loop_configure+0x954/0x1480 [ 1661.034087] lo_ioctl+0xa72/0x1760 [ 1661.034496] ? avc_has_extended_perms+0x7f1/0xf40 [ 1661.035046] ? loop_set_status_old+0x250/0x250 [ 1661.035556] ? avc_ss_reset+0x180/0x180 [ 1661.036017] ? lock_acquire+0x197/0x470 [ 1661.036462] ? find_held_lock+0x2c/0x110 [ 1661.036912] ? __lock_acquire+0xbb1/0x5b00 [ 1661.037429] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1661.038014] ? generic_block_fiemap+0x60/0x60 [ 1661.038523] ? loop_set_status_old+0x250/0x250 [ 1661.039038] blkdev_ioctl+0x291/0x710 [ 1661.039472] ? blkdev_common_ioctl+0x1870/0x1870 [ 1661.040020] ? selinux_file_ioctl+0xb6/0x270 [ 1661.040510] block_ioctl+0xf9/0x140 [ 1661.040924] ? blkdev_read_iter+0x1c0/0x1c0 [ 1661.041410] __x64_sys_ioctl+0x19a/0x210 [ 1661.041875] do_syscall_64+0x33/0x40 [ 1661.042299] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1661.042875] RIP: 0033:0x7f105c0388d7 [ 1661.043296] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1661.045363] RSP: 002b:00007f10595adf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1661.046201] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105c0388d7 [ 1661.046988] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1661.047791] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1661.048567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1661.049366] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1661.075526] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:52:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x4000}]}, 0x1c}}, 0x0) 03:52:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:52:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 28) 03:52:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) [ 1661.192781] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1661.210646] FAULT_INJECTION: forcing a failure. [ 1661.210646] name failslab, interval 1, probability 0, space 0, times 0 [ 1661.211975] CPU: 1 PID: 9919 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1661.212714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1661.213629] Call Trace: [ 1661.213934] dump_stack+0x107/0x167 [ 1661.214331] should_fail.cold+0x5/0xa [ 1661.214746] ? create_object.isra.0+0x3a/0xa20 [ 1661.215260] should_failslab+0x5/0x20 [ 1661.215672] kmem_cache_alloc+0x5b/0x310 [ 1661.216130] create_object.isra.0+0x3a/0xa20 [ 1661.216604] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1661.217166] kmem_cache_alloc+0x159/0x310 [ 1661.217627] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1661.218227] idr_get_free+0x4b5/0x8f0 [ 1661.218646] idr_alloc_u32+0x170/0x2d0 [ 1661.219071] ? __fprop_inc_percpu_max+0x130/0x130 [ 1661.219618] ? lock_acquire+0x197/0x470 [ 1661.220061] ? __kernfs_new_node+0xff/0x850 [ 1661.220541] idr_alloc_cyclic+0x102/0x230 [ 1661.221001] ? idr_alloc+0x130/0x130 [ 1661.221426] ? rwlock_bug.part.0+0x90/0x90 [ 1661.221915] __kernfs_new_node+0x117/0x850 [ 1661.222385] ? perf_trace_lock+0xac/0x490 [ 1661.222849] ? perf_trace_lock+0xac/0x490 [ 1661.223312] ? lock_chain_count+0x20/0x20 [ 1661.223791] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1661.224331] ? __lockdep_reset_lock+0x180/0x180 [ 1661.224851] ? __lockdep_reset_lock+0x180/0x180 [ 1661.225378] ? update_load_avg+0x162/0x1870 [ 1661.225871] ? find_held_lock+0x2c/0x110 [ 1661.226336] ? set_user_nice.part.0+0x2fd/0x760 [ 1661.226857] kernfs_create_dir_ns+0x9c/0x230 [ 1661.227346] internal_create_group+0x793/0xb30 [ 1661.227861] ? set_user_nice.part.0+0x2fd/0x760 [ 1661.228380] ? sysfs_remove_group+0x170/0x170 [ 1661.228876] ? lockdep_init_map_type+0x2c7/0x780 [ 1661.229410] ? blk_queue_flag_set+0x22/0x30 [ 1661.229886] ? __loop_update_dio+0x2d2/0x690 [ 1661.230374] loop_configure+0x954/0x1480 [ 1661.230831] lo_ioctl+0xa72/0x1760 [ 1661.231239] ? avc_has_extended_perms+0x7f1/0xf40 [ 1661.231760] ? loop_set_status_old+0x250/0x250 [ 1661.232283] ? avc_ss_reset+0x180/0x180 [ 1661.232720] ? lock_acquire+0x197/0x470 [ 1661.233174] ? find_held_lock+0x2c/0x110 [ 1661.233619] ? __lock_acquire+0xbb1/0x5b00 [ 1661.234123] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1661.234712] ? generic_block_fiemap+0x60/0x60 [ 1661.235218] ? loop_set_status_old+0x250/0x250 [ 1661.235722] blkdev_ioctl+0x291/0x710 [ 1661.236149] ? blkdev_common_ioctl+0x1870/0x1870 [ 1661.236676] ? selinux_file_ioctl+0xb6/0x270 [ 1661.237169] block_ioctl+0xf9/0x140 [ 1661.237578] ? blkdev_read_iter+0x1c0/0x1c0 [ 1661.238065] __x64_sys_ioctl+0x19a/0x210 [ 1661.238529] do_syscall_64+0x33/0x40 [ 1661.238947] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1661.239525] RIP: 0033:0x7f105c0388d7 [ 1661.239945] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1661.242022] RSP: 002b:00007f10595adf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1661.242865] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105c0388d7 [ 1661.243677] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1661.244485] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1661.245282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1661.246076] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1661.261149] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:52:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 29) 03:52:56 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 1661.302581] FAULT_INJECTION: forcing a failure. [ 1661.302581] name failslab, interval 1, probability 0, space 0, times 0 [ 1661.303862] CPU: 1 PID: 9926 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1661.304611] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1661.305530] Call Trace: [ 1661.305837] dump_stack+0x107/0x167 [ 1661.306261] should_fail.cold+0x5/0xa [ 1661.306701] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1661.307347] should_failslab+0x5/0x20 [ 1661.307783] kmem_cache_alloc+0x5b/0x310 [ 1661.308263] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1661.308885] idr_get_free+0x4b5/0x8f0 [ 1661.309331] idr_alloc_u32+0x170/0x2d0 [ 1661.309791] ? __fprop_inc_percpu_max+0x130/0x130 [ 1661.310348] ? lock_acquire+0x197/0x470 [ 1661.310803] ? __kernfs_new_node+0xff/0x850 [ 1661.311297] idr_alloc_cyclic+0x102/0x230 [ 1661.311761] ? idr_alloc+0x130/0x130 [ 1661.312203] ? rwlock_bug.part.0+0x90/0x90 [ 1661.312706] __kernfs_new_node+0x117/0x850 [ 1661.313192] ? perf_trace_lock+0xac/0x490 [ 1661.313666] ? perf_trace_lock+0xac/0x490 [ 1661.314138] ? lock_chain_count+0x20/0x20 [ 1661.314615] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1661.315159] ? __lockdep_reset_lock+0x180/0x180 [ 1661.315675] ? __lockdep_reset_lock+0x180/0x180 [ 1661.316193] ? update_load_avg+0x162/0x1870 [ 1661.316666] ? find_held_lock+0x2c/0x110 [ 1661.317109] ? set_user_nice.part.0+0x2fd/0x760 [ 1661.317621] kernfs_create_dir_ns+0x9c/0x230 [ 1661.318094] internal_create_group+0x793/0xb30 [ 1661.318604] ? set_user_nice.part.0+0x2fd/0x760 [ 1661.319102] ? sysfs_remove_group+0x170/0x170 [ 1661.319599] ? lockdep_init_map_type+0x2c7/0x780 [ 1661.320135] ? blk_queue_flag_set+0x22/0x30 [ 1661.320609] ? __loop_update_dio+0x2d2/0x690 [ 1661.321080] loop_configure+0x954/0x1480 [ 1661.321539] lo_ioctl+0xa72/0x1760 [ 1661.321928] ? avc_has_extended_perms+0x7f1/0xf40 [ 1661.322488] ? loop_set_status_old+0x250/0x250 [ 1661.322982] ? avc_ss_reset+0x180/0x180 [ 1661.323444] ? lock_acquire+0x197/0x470 [ 1661.323877] ? find_held_lock+0x2c/0x110 [ 1661.324360] ? __lock_acquire+0xbb1/0x5b00 [ 1661.324861] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1661.325466] ? generic_block_fiemap+0x60/0x60 [ 1661.325960] ? loop_set_status_old+0x250/0x250 [ 1661.326492] blkdev_ioctl+0x291/0x710 [ 1661.326914] ? blkdev_common_ioctl+0x1870/0x1870 [ 1661.327466] ? selinux_file_ioctl+0xb6/0x270 [ 1661.327955] block_ioctl+0xf9/0x140 [ 1661.328376] ? blkdev_read_iter+0x1c0/0x1c0 [ 1661.328847] __x64_sys_ioctl+0x19a/0x210 [ 1661.329315] do_syscall_64+0x33/0x40 [ 1661.329733] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1661.330319] RIP: 0033:0x7f105c0388d7 [ 1661.330738] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1661.332825] RSP: 002b:00007f10595adf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1661.333687] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105c0388d7 [ 1661.334496] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1661.335304] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1661.336109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1661.336912] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1661.356379] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1661.439977] blktrace: Concurrent blktraces are not allowed on sg0 03:53:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) 03:53:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:53:12 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:53:12 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x80086601, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1677.239785] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1677.248955] blktrace: Concurrent blktraces are not allowed on sg0 03:53:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x4503}]}, 0x1c}}, 0x0) 03:53:12 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x74, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:53:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 30) [ 1677.275489] blktrace: Concurrent blktraces are not allowed on sg0 [ 1677.278652] FAULT_INJECTION: forcing a failure. [ 1677.278652] name failslab, interval 1, probability 0, space 0, times 0 [ 1677.281061] CPU: 0 PID: 9946 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1677.282486] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1677.284237] Call Trace: [ 1677.284801] dump_stack+0x107/0x167 [ 1677.285580] should_fail.cold+0x5/0xa [ 1677.286387] ? create_object.isra.0+0x3a/0xa20 [ 1677.287353] should_failslab+0x5/0x20 [ 1677.288181] kmem_cache_alloc+0x5b/0x310 [ 1677.289049] create_object.isra.0+0x3a/0xa20 [ 1677.289976] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1677.291049] kmem_cache_alloc+0x159/0x310 [ 1677.291936] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1677.293129] idr_get_free+0x4b5/0x8f0 [ 1677.293951] idr_alloc_u32+0x170/0x2d0 [ 1677.294776] ? __fprop_inc_percpu_max+0x130/0x130 [ 1677.295792] ? lock_acquire+0x197/0x470 [ 1677.296640] ? __kernfs_new_node+0xff/0x850 [ 1677.297567] idr_alloc_cyclic+0x102/0x230 [ 1677.298450] ? idr_alloc+0x130/0x130 [ 1677.299242] ? rwlock_bug.part.0+0x90/0x90 [ 1677.300165] __kernfs_new_node+0x117/0x850 [ 1677.301053] ? perf_trace_lock+0xac/0x490 [ 1677.301926] ? perf_trace_lock+0xac/0x490 [ 1677.302803] ? lock_chain_count+0x20/0x20 [ 1677.303690] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1677.304700] ? __lockdep_reset_lock+0x180/0x180 [ 1677.305668] ? __lockdep_reset_lock+0x180/0x180 [ 1677.306636] ? task_rq_lock+0xab/0x270 [ 1677.307461] ? lock_release+0x680/0x680 [ 1677.308301] ? find_held_lock+0x2c/0x110 [ 1677.309157] ? set_user_nice.part.0+0x2fd/0x760 [ 1677.310139] kernfs_create_dir_ns+0x9c/0x230 [ 1677.311074] internal_create_group+0x793/0xb30 [ 1677.312053] ? set_user_nice.part.0+0x2fd/0x760 [ 1677.313023] ? sysfs_remove_group+0x170/0x170 [ 1677.313969] ? lockdep_init_map_type+0x2c7/0x780 [ 1677.314965] ? blk_queue_flag_set+0x22/0x30 [ 1677.315868] ? __loop_update_dio+0x2d2/0x690 [ 1677.316811] loop_configure+0x954/0x1480 [ 1677.317680] lo_ioctl+0xa72/0x1760 [ 1677.318423] ? avc_has_extended_perms+0x7f1/0xf40 [ 1677.319438] ? loop_set_status_old+0x250/0x250 [ 1677.320414] ? avc_ss_reset+0x180/0x180 [ 1677.321249] ? lock_acquire+0x197/0x470 [ 1677.322079] ? find_held_lock+0x2c/0x110 [ 1677.322945] ? __lock_acquire+0xbb1/0x5b00 [ 1677.323895] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1677.325007] ? generic_block_fiemap+0x60/0x60 [ 1677.325958] ? loop_set_status_old+0x250/0x250 [ 1677.326907] blkdev_ioctl+0x291/0x710 [ 1677.327712] ? blkdev_common_ioctl+0x1870/0x1870 [ 1677.328721] ? selinux_file_ioctl+0xb6/0x270 [ 1677.329647] block_ioctl+0xf9/0x140 [ 1677.330426] ? blkdev_read_iter+0x1c0/0x1c0 [ 1677.331334] __x64_sys_ioctl+0x19a/0x210 [ 1677.332240] do_syscall_64+0x33/0x40 [ 1677.333022] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1677.334112] RIP: 0033:0x7f105c0388d7 [ 1677.334892] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1677.338783] RSP: 002b:00007f10595adf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1677.340421] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105c0388d7 [ 1677.341930] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1677.343429] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1677.344924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1677.346396] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1677.364578] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:53:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xe401}]}, 0x1c}}, 0x0) 03:53:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, 0x0, 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:53:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/140], 0x160}}, 0x0) [ 1677.420130] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:53:12 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:53:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 31) 03:53:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xf000}]}, 0x1c}}, 0x0) 03:53:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/140], 0x160}}, 0x0) 03:53:12 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1677.543324] FAULT_INJECTION: forcing a failure. [ 1677.543324] name failslab, interval 1, probability 0, space 0, times 0 [ 1677.545696] CPU: 1 PID: 9967 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1677.547123] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1677.548851] Call Trace: [ 1677.549415] dump_stack+0x107/0x167 [ 1677.550183] should_fail.cold+0x5/0xa [ 1677.550970] ? __kernfs_new_node+0xd4/0x850 [ 1677.551875] should_failslab+0x5/0x20 [ 1677.552691] kmem_cache_alloc+0x5b/0x310 [ 1677.553546] __kernfs_new_node+0xd4/0x850 [ 1677.554410] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1677.555395] ? lock_downgrade+0x6d0/0x6d0 [ 1677.556269] ? mutex_lock_io_nested+0xf30/0xf30 [ 1677.557225] ? __kernfs_new_node+0x549/0x850 [ 1677.558142] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1677.559135] ? __lockdep_reset_lock+0x180/0x180 [ 1677.560104] kernfs_new_node+0x93/0x120 [ 1677.560934] __kernfs_create_file+0x51/0x350 [ 1677.561857] sysfs_add_file_mode_ns+0x221/0x560 [ 1677.562829] internal_create_group+0x324/0xb30 [ 1677.563780] ? sysfs_remove_group+0x170/0x170 [ 1677.564727] ? lockdep_init_map_type+0x2c7/0x780 [ 1677.565707] ? blk_queue_flag_set+0x22/0x30 [ 1677.566592] ? __loop_update_dio+0x2d2/0x690 [ 1677.567501] loop_configure+0x954/0x1480 [ 1677.568358] lo_ioctl+0xa72/0x1760 [ 1677.569091] ? avc_has_extended_perms+0x7f1/0xf40 [ 1677.570085] ? loop_set_status_old+0x250/0x250 [ 1677.571031] ? avc_ss_reset+0x180/0x180 [ 1677.571852] ? lock_acquire+0x197/0x470 [ 1677.572694] ? find_held_lock+0x2c/0x110 [ 1677.573553] ? __lock_acquire+0xbb1/0x5b00 [ 1677.574482] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1677.575563] ? generic_block_fiemap+0x60/0x60 [ 1677.576503] ? loop_set_status_old+0x250/0x250 [ 1677.577433] blkdev_ioctl+0x291/0x710 [ 1677.578219] ? blkdev_common_ioctl+0x1870/0x1870 [ 1677.579196] ? selinux_file_ioctl+0xb6/0x270 [ 1677.580113] block_ioctl+0xf9/0x140 [ 1677.580862] ? blkdev_read_iter+0x1c0/0x1c0 [ 1677.581779] __x64_sys_ioctl+0x19a/0x210 [ 1677.582631] do_syscall_64+0x33/0x40 [ 1677.583402] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1677.584477] RIP: 0033:0x7f105c0388d7 [ 1677.585248] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1677.589076] RSP: 002b:00007f10595adf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1677.590650] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105c0388d7 [ 1677.592162] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1677.593633] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1677.595095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1677.596581] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1677.607058] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1677.624232] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:53:12 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x80087601, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x34000}]}, 0x1c}}, 0x0) 03:53:28 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:28 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, 0x0, 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:53:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 32) 03:53:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/140], 0x160}}, 0x0) 03:53:28 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x7a, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1694.123196] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1694.128042] FAULT_INJECTION: forcing a failure. [ 1694.128042] name failslab, interval 1, probability 0, space 0, times 0 [ 1694.130357] CPU: 1 PID: 9999 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1694.131729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1694.133413] Call Trace: [ 1694.133948] dump_stack+0x107/0x167 [ 1694.134684] should_fail.cold+0x5/0xa [ 1694.135449] ? create_object.isra.0+0x3a/0xa20 [ 1694.136375] should_failslab+0x5/0x20 [ 1694.137141] kmem_cache_alloc+0x5b/0x310 [ 1694.137971] create_object.isra.0+0x3a/0xa20 [ 1694.138864] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1694.139893] kmem_cache_alloc+0x159/0x310 [ 1694.140756] __kernfs_new_node+0xd4/0x850 [ 1694.141604] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1694.142558] ? lock_downgrade+0x6d0/0x6d0 [ 1694.143404] ? mutex_lock_io_nested+0xf30/0xf30 [ 1694.144343] ? __kernfs_new_node+0x549/0x850 [ 1694.145236] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1694.146208] ? __lockdep_reset_lock+0x180/0x180 [ 1694.147144] kernfs_new_node+0x93/0x120 [ 1694.147945] __kernfs_create_file+0x51/0x350 [ 1694.148841] sysfs_add_file_mode_ns+0x221/0x560 [ 1694.149781] internal_create_group+0x324/0xb30 [ 1694.150699] ? sysfs_remove_group+0x170/0x170 [ 1694.151596] ? lockdep_init_map_type+0x2c7/0x780 [ 1694.152562] ? blk_queue_flag_set+0x22/0x30 [ 1694.153420] ? __loop_update_dio+0x2d2/0x690 [ 1694.154300] loop_configure+0x954/0x1480 [ 1694.155121] lo_ioctl+0xa72/0x1760 [ 1694.155832] ? avc_has_extended_perms+0x7f1/0xf40 [ 1694.156806] ? loop_set_status_old+0x250/0x250 [ 1694.157718] ? avc_ss_reset+0x180/0x180 [ 1694.158513] ? lock_acquire+0x197/0x470 [ 1694.159304] ? find_held_lock+0x2c/0x110 [ 1694.160123] ? __lock_acquire+0xbb1/0x5b00 [ 1694.161048] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1694.162089] ? generic_block_fiemap+0x60/0x60 [ 1694.162986] ? loop_set_status_old+0x250/0x250 [ 1694.163881] blkdev_ioctl+0x291/0x710 [ 1694.164676] ? blkdev_common_ioctl+0x1870/0x1870 [ 1694.165616] ? selinux_file_ioctl+0xb6/0x270 [ 1694.166497] block_ioctl+0xf9/0x140 [ 1694.167217] ? blkdev_read_iter+0x1c0/0x1c0 [ 1694.168083] __x64_sys_ioctl+0x19a/0x210 [ 1694.168911] do_syscall_64+0x33/0x40 [ 1694.169640] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1694.170657] RIP: 0033:0x7f105c0388d7 [ 1694.171398] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1694.175066] RSP: 002b:00007f10595adf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1694.176593] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105c0388d7 [ 1694.178027] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1694.179438] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1694.180861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1694.182277] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 1694.190513] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:53:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 33) 03:53:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) 03:53:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x80000}]}, 0x1c}}, 0x0) [ 1694.282757] FAULT_INJECTION: forcing a failure. [ 1694.282757] name failslab, interval 1, probability 0, space 0, times 0 [ 1694.285227] CPU: 1 PID: 10011 Comm: syz-executor.6 Not tainted 5.10.184 #1 [ 1694.286598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1694.288227] Call Trace: [ 1694.288760] dump_stack+0x107/0x167 [ 1694.289484] should_fail.cold+0x5/0xa [ 1694.290239] ? __kernfs_new_node+0xd4/0x850 [ 1694.291092] should_failslab+0x5/0x20 [ 1694.291847] kmem_cache_alloc+0x5b/0x310 [ 1694.292678] __kernfs_new_node+0xd4/0x850 [ 1694.293502] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1694.294459] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1694.295415] ? wait_for_completion_io+0x270/0x270 [ 1694.296394] ? kernfs_next_descendant_post+0x1a7/0x2a0 [ 1694.297444] kernfs_new_node+0x93/0x120 [ 1694.298246] __kernfs_create_file+0x51/0x350 [ 1694.299127] sysfs_add_file_mode_ns+0x221/0x560 [ 1694.300075] internal_create_group+0x324/0xb30 [ 1694.301005] ? sysfs_remove_group+0x170/0x170 [ 1694.301901] ? lockdep_init_map_type+0x2c7/0x780 [ 1694.302850] ? blk_queue_flag_set+0x22/0x30 [ 1694.303709] ? __loop_update_dio+0x2d2/0x690 [ 1694.304613] loop_configure+0x954/0x1480 [ 1694.305442] lo_ioctl+0xa72/0x1760 [ 1694.306157] ? avc_has_extended_perms+0x7f1/0xf40 [ 1694.307128] ? loop_set_status_old+0x250/0x250 [ 1694.308045] ? avc_ss_reset+0x180/0x180 [ 1694.308857] ? lock_acquire+0x197/0x470 [ 1694.309651] ? find_held_lock+0x2c/0x110 [ 1694.310476] ? __lock_acquire+0xbb1/0x5b00 [ 1694.311377] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1694.312450] ? generic_block_fiemap+0x60/0x60 [ 1694.313354] ? loop_set_status_old+0x250/0x250 [ 1694.314262] blkdev_ioctl+0x291/0x710 [ 1694.315023] ? blkdev_common_ioctl+0x1870/0x1870 [ 1694.315973] ? selinux_file_ioctl+0xb6/0x270 [ 1694.316868] block_ioctl+0xf9/0x140 [ 1694.317592] ? blkdev_read_iter+0x1c0/0x1c0 [ 1694.318454] __x64_sys_ioctl+0x19a/0x210 [ 1694.319271] do_syscall_64+0x33/0x40 [ 1694.320020] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1694.321056] RIP: 0033:0x7f105c0388d7 [ 1694.321798] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1694.325469] RSP: 002b:00007f10595adf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1694.326985] RAX: ffffffffffffffda RBX: 00007f105c082970 RCX: 00007f105c0388d7 [ 1694.328412] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1694.329837] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1694.331260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1694.332698] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 03:53:29 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 1694.353343] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:53:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) 03:53:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) (fail_nth: 34) 03:53:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x400300}]}, 0x1c}}, 0x0) 03:53:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0xd1, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:53:43 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0xff, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:53:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) 03:53:43 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:43 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:53:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:53:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xf0ffff}]}, 0x1c}}, 0x0) 03:53:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, 0x0, 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:53:43 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:43 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 1708.541045] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:53:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000200100004000000097"], 0x160}}, 0x0) 03:53:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x1000000}]}, 0x1c}}, 0x0) 03:53:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:53:43 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:43 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0189436, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 1708.753015] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1708.770899] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1708.784557] blktrace: Concurrent blktraces are not allowed on sg0 03:53:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:53:56 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) gettid() rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 03:53:56 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc020660b, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:53:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:53:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) 03:53:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x2000000}]}, 0x1c}}, 0x0) 03:53:56 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1721.784816] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1721.826299] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:53:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) 03:53:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:53:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x3000000}]}, 0x1c}}, 0x0) [ 1721.920278] blktrace: Concurrent blktraces are not allowed on sg0 03:53:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x9000000}]}, 0x1c}}, 0x0) 03:53:56 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) gettid() rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) [ 1721.957109] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:53:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:53:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) 03:53:56 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x2, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:53:56 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048120a, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:53:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:53:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xa000000}]}, 0x1c}}, 0x0) 03:53:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000"], 0x160}}, 0x0) [ 1722.200489] blktrace: Concurrent blktraces are not allowed on sg0 [ 1722.240985] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:53:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000"], 0x160}}, 0x0) 03:53:57 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) gettid() rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 03:53:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:53:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xf000000}]}, 0x1c}}, 0x0) [ 1722.422548] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1722.449359] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:54:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:54:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:54:11 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481223, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:54:11 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:54:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x20000000}]}, 0x1c}}, 0x0) 03:54:11 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:54:11 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x0, &(0x7f0000000600)) 03:54:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000"], 0x160}}, 0x0) [ 1736.879702] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:54:26 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x4, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:54:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:54:26 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481225, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:54:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000020"], 0x160}}, 0x0) 03:54:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:54:26 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:54:26 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x0, &(0x7f0000000600)) 03:54:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x2a010000}]}, 0x1c}}, 0x0) [ 1752.051519] blktrace: Concurrent blktraces are not allowed on sg0 03:54:26 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x0, &(0x7f0000000600)) [ 1752.073470] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1752.120176] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:54:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x40000000}]}, 0x1c}}, 0x0) 03:54:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000020"], 0x160}}, 0x0) 03:54:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:54:26 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:54:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:54:26 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122a, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1752.200401] blktrace: Concurrent blktraces are not allowed on sg0 [ 1752.232584] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:54:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000020"], 0x160}}, 0x0) 03:54:39 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, 0x0) 03:54:39 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:54:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:54:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x45030000}]}, 0x1c}}, 0x0) 03:54:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x5, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:54:39 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122b, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:54:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:54:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1764.955613] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:54:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0x9effffff}]}, 0x1c}}, 0x0) 03:54:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000020"], 0x160}}, 0x0) [ 1764.985219] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:54:39 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:54:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000020"], 0x160}}, 0x0) 03:54:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:54:39 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:54:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:54:39 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, 0x0) 03:54:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xe4010000}]}, 0x1c}}, 0x0) 03:54:39 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122d, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:54:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000020"], 0x160}}, 0x0) 03:54:39 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1765.192383] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1765.230087] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:54:56 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122e, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:54:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:54:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xf0ffffff}]}, 0x1c}}, 0x0) [ 1781.717920] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:54:56 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:54:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000200100"], 0x160}}, 0x0) 03:54:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:54:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x6, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:54:56 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, 0x0) [ 1781.741624] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:54:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:54:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000200100"], 0x160}}, 0x0) 03:54:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xfeffffff}]}, 0x1c}}, 0x0) [ 1781.878338] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:54:56 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:55:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:55:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:55:09 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:55:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:55:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000200100"], 0x160}}, 0x0) 03:55:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xfffff000}]}, 0x1c}}, 0x0) 03:55:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x5, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:55:09 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481230, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1794.651201] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:55:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xffffff7f}]}, 0x1c}}, 0x0) [ 1794.680790] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:55:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000020010000"], 0x160}}, 0x0) 03:55:09 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:09 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481258, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xffffff9e}]}, 0x1c}}, 0x0) 03:55:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:55:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:55:09 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1794.866708] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1794.906447] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:55:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:55:24 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xfffffff0}]}, 0x1c}}, 0x0) 03:55:24 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481263, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000020010000"], 0x160}}, 0x0) 03:55:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0xc, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:55:25 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x14, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:55:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 1810.262679] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:55:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xfffffffe}]}, 0x1c}}, 0x0) 03:55:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000020010000"], 0x160}}, 0x0) [ 1810.325459] blktrace: Concurrent blktraces are not allowed on sg0 03:55:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:55:25 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:55:25 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481223, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:25 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481264, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:55:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32=0xffffffff}]}, 0x1c}}, 0x0) [ 1810.491407] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1810.510212] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1810.527800] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:55:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:55:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0xf}}, 0x0) 03:55:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1810.589697] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1810.622866] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:55:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x10}}, 0x0) 03:55:40 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:40 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481269, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:55:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:55:40 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481223, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x22, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:55:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1825.732849] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1825.771030] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:55:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1b}}, 0x0) 03:55:40 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481223, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:40 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1825.835802] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:55:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:55:53 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048126c, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:53 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:53 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:55:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:55:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x23, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:55:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0xc0}}, 0x0) 03:55:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 1839.162121] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1839.194209] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:55:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:55:54 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:55:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0xec0}}, 0x0) 03:55:54 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048126f, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:55:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:55:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:55:54 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) [ 1839.291476] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:55:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1839.330897] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1839.354779] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:55:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x33fe0}}, 0x0) [ 1839.415391] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:56:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x27, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:56:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:56:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x200000dc}}, 0x0) 03:56:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:56:06 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() 03:56:06 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:56:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:56:06 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481270, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1852.055744] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:56:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1852.085915] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:56:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x7ffff000}}, 0x0) 03:56:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:56:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:56:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1852.241401] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:56:07 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0xa6219d3}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040000000976ae46d07d1812fd0664e95dee193a2b91df2e10ff98153074f6adbe3550c030000001b"], 0x160}}, 0x0) 03:56:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0xfffffdef}}, 0x0) 03:56:07 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:56:20 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481275, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x48, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:56:20 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 03:56:20 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5386, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:56:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x2}, 0x0) 03:56:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x3}, 0x0) [ 1865.781561] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:56:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1865.817612] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:56:20 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481278, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:20 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) (fail_nth: 1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:56:20 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:56:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x8}, 0x0) [ 1865.925428] FAULT_INJECTION: forcing a failure. [ 1865.925428] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1865.926724] CPU: 0 PID: 10616 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1865.927422] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1865.928259] Call Trace: [ 1865.928535] dump_stack+0x107/0x167 [ 1865.928912] should_fail.cold+0x5/0xa [ 1865.929313] _copy_from_user+0x2e/0x1b0 [ 1865.929723] __blk_trace_setup+0x96/0x180 [ 1865.930146] ? do_blk_trace_setup+0xc10/0xc10 [ 1865.930632] ? perf_trace_lock+0xac/0x490 [ 1865.931056] ? SOFTIRQ_verbose+0x10/0x10 [ 1865.931477] blk_trace_setup+0x43/0x60 [ 1865.931879] sg_ioctl_common+0x634/0x2570 [ 1865.932306] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1865.932834] ? do_vfs_ioctl+0x283/0x10d0 [ 1865.933250] ? sg_write+0x120/0x120 [ 1865.933622] ? generic_block_fiemap+0x60/0x60 [ 1865.934082] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1865.934595] ? selinux_file_ioctl+0xb6/0x270 [ 1865.935042] ? sg_compat_ioctl+0x120/0x120 [ 1865.935474] sg_ioctl+0x8f/0x120 [ 1865.935824] __x64_sys_ioctl+0x19a/0x210 [ 1865.936245] do_syscall_64+0x33/0x40 [ 1865.936657] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1865.937220] RIP: 0033:0x7f1ac5591b19 [ 1865.937629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1865.939651] RSP: 002b:00007f1ac2b07188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1865.940488] RAX: ffffffffffffffda RBX: 00007f1ac56a4f60 RCX: 00007f1ac5591b19 [ 1865.941269] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1865.942049] RBP: 00007f1ac2b071d0 R08: 0000000000000000 R09: 0000000000000000 [ 1865.942833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1865.943621] R13: 00007ffd3b2574cf R14: 00007f1ac2b07300 R15: 0000000000022000 [ 1865.954508] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:56:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 03:56:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff020000000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:56:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x4c, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:56:20 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x14}, 0x0) 03:56:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x142, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:56:20 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1866.061623] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:56:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff020000000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1866.125561] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1866.151553] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1866.151879] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:56:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x68, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:56:33 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:33 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) (fail_nth: 2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:33 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x2, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1879.069824] FAULT_INJECTION: forcing a failure. [ 1879.069824] name failslab, interval 1, probability 0, space 0, times 0 [ 1879.071877] CPU: 0 PID: 10650 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1879.072805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1879.073917] Call Trace: [ 1879.074282] dump_stack+0x107/0x167 [ 1879.074793] should_fail.cold+0x5/0xa [ 1879.075324] ? do_blk_trace_setup+0x1e3/0xc10 [ 1879.075952] should_failslab+0x5/0x20 [ 1879.076473] kmem_cache_alloc_trace+0x55/0x320 [ 1879.077098] do_blk_trace_setup+0x1e3/0xc10 [ 1879.077646] ? _copy_from_user+0xfb/0x1b0 [ 1879.078186] __blk_trace_setup+0xca/0x180 [ 1879.078725] ? do_blk_trace_setup+0xc10/0xc10 [ 1879.079311] ? perf_trace_lock+0xac/0x490 [ 1879.079851] blk_trace_setup+0x43/0x60 [ 1879.080389] sg_ioctl_common+0x634/0x2570 [ 1879.080940] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1879.081628] ? do_vfs_ioctl+0x283/0x10d0 [ 1879.082155] ? sg_write+0x120/0x120 [ 1879.082651] ? generic_block_fiemap+0x60/0x60 [ 1879.083281] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1879.083948] ? selinux_file_ioctl+0xb6/0x270 [ 1879.084516] ? sg_compat_ioctl+0x120/0x120 [ 1879.085113] sg_ioctl+0x8f/0x120 [ 1879.085550] __x64_sys_ioctl+0x19a/0x210 [ 1879.086094] do_syscall_64+0x33/0x40 [ 1879.086578] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1879.087959] RIP: 0033:0x7f1ac5591b19 [ 1879.088941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1879.093728] RSP: 002b:00007f1ac2b07188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1879.095713] RAX: ffffffffffffffda RBX: 00007f1ac56a4f60 RCX: 00007f1ac5591b19 [ 1879.097560] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1879.099415] RBP: 00007f1ac2b071d0 R08: 0000000000000000 R09: 0000000000000000 [ 1879.101260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1879.103127] R13: 00007ffd3b2574cf R14: 00007f1ac2b07300 R15: 0000000000022000 [ 1879.131855] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:56:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x3d}, 0x0) 03:56:33 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 03:56:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x143, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:56:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff020000000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:56:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1879.163189] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1879.187202] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:56:34 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) (fail_nth: 3) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1879.216434] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:56:34 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:56:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x500}, 0x0) [ 1879.243743] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1879.262343] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:56:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:56:34 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x410, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:56:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1a00}, 0x0) 03:56:34 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1879.347696] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1879.349926] FAULT_INJECTION: forcing a failure. [ 1879.349926] name failslab, interval 1, probability 0, space 0, times 0 [ 1879.352488] CPU: 0 PID: 10683 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1879.353668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1879.355093] Call Trace: [ 1879.355553] dump_stack+0x107/0x167 [ 1879.356183] should_fail.cold+0x5/0xa [ 1879.356834] ? create_object.isra.0+0x3a/0xa20 [ 1879.357614] should_failslab+0x5/0x20 [ 1879.358262] kmem_cache_alloc+0x5b/0x310 [ 1879.358964] create_object.isra.0+0x3a/0xa20 [ 1879.359709] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1879.360570] kmem_cache_alloc_trace+0x151/0x320 [ 1879.361369] do_blk_trace_setup+0x1e3/0xc10 [ 1879.362109] ? _copy_from_user+0xfb/0x1b0 [ 1879.362830] __blk_trace_setup+0xca/0x180 [ 1879.363532] ? do_blk_trace_setup+0xc10/0xc10 [ 1879.364296] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1879.365214] ? trace_hardirqs_on+0x5b/0x180 [ 1879.365964] ? do_raw_spin_unlock+0x4f/0x220 [ 1879.366738] blk_trace_setup+0x43/0x60 [ 1879.367408] sg_ioctl_common+0x634/0x2570 [ 1879.368115] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1879.369002] ? do_vfs_ioctl+0x283/0x10d0 [ 1879.369691] ? sg_write+0x120/0x120 [ 1879.370314] ? generic_block_fiemap+0x60/0x60 [ 1879.371108] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1879.371948] ? selinux_file_ioctl+0xb6/0x270 [ 1879.372701] ? sg_compat_ioctl+0x120/0x120 [ 1879.373428] sg_ioctl+0x8f/0x120 [ 1879.374011] __x64_sys_ioctl+0x19a/0x210 [ 1879.374725] do_syscall_64+0x33/0x40 [ 1879.375364] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1879.376244] RIP: 0033:0x7f1ac5591b19 [ 1879.376891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1879.380035] RSP: 002b:00007f1ac2b07188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1879.381361] RAX: ffffffffffffffda RBX: 00007f1ac56a4f60 RCX: 00007f1ac5591b19 [ 1879.382581] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1879.383801] RBP: 00007f1ac2b071d0 R08: 0000000000000000 R09: 0000000000000000 [ 1879.384984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1879.386155] R13: 00007ffd3b2574cf R14: 00007f1ac2b07300 R15: 0000000000022000 03:56:45 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:45 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x3, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:45 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) (fail_nth: 4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1b00}, 0x0) 03:56:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:56:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x6c, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:56:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000600)) 03:56:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1891.110786] FAULT_INJECTION: forcing a failure. [ 1891.110786] name failslab, interval 1, probability 0, space 0, times 0 [ 1891.112958] CPU: 1 PID: 10702 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1891.114197] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1891.115690] Call Trace: [ 1891.116171] dump_stack+0x107/0x167 [ 1891.116829] should_fail.cold+0x5/0xa [ 1891.117517] ? create_object.isra.0+0x3a/0xa20 [ 1891.118340] should_failslab+0x5/0x20 [ 1891.119043] kmem_cache_alloc+0x5b/0x310 [ 1891.119772] create_object.isra.0+0x3a/0xa20 [ 1891.120566] kmemleak_alloc_percpu+0xa0/0x100 [ 1891.121372] pcpu_alloc+0x4e2/0x1240 [ 1891.121938] do_blk_trace_setup+0x203/0xc10 [ 1891.122723] ? _copy_from_user+0xfb/0x1b0 [ 1891.123464] __blk_trace_setup+0xca/0x180 [ 1891.124200] ? do_blk_trace_setup+0xc10/0xc10 [ 1891.125011] ? perf_trace_lock+0xac/0x490 [ 1891.125756] blk_trace_setup+0x43/0x60 [ 1891.126454] sg_ioctl_common+0x634/0x2570 [ 1891.127208] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1891.127873] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1891.128128] ? do_vfs_ioctl+0x283/0x10d0 [ 1891.128141] ? sg_write+0x120/0x120 [ 1891.128159] ? generic_block_fiemap+0x60/0x60 [ 1891.128180] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1891.133089] ? selinux_file_ioctl+0xb6/0x270 [ 1891.133864] ? sg_compat_ioctl+0x120/0x120 [ 1891.134620] sg_ioctl+0x8f/0x120 [ 1891.135235] __x64_sys_ioctl+0x19a/0x210 [ 1891.135962] do_syscall_64+0x33/0x40 [ 1891.136629] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1891.137377] RIP: 0033:0x7f1ac5591b19 [ 1891.138037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1891.140995] RSP: 002b:00007f1ac2b07188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1891.142210] RAX: ffffffffffffffda RBX: 00007f1ac56a4f60 RCX: 00007f1ac5591b19 [ 1891.143264] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1891.144398] RBP: 00007f1ac2b071d0 R08: 0000000000000000 R09: 0000000000000000 [ 1891.145433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1891.146581] R13: 00007ffd3b2574cf R14: 00007f1ac2b07300 R15: 0000000000022000 [ 1891.160908] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1891.175853] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1891.232936] blktrace: Concurrent blktraces are not allowed on sg0 [ 1891.235242] blktrace: Concurrent blktraces are not allowed on sg0 03:56:58 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x74, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:56:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1c00}, 0x0) 03:56:58 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x4, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1904.090125] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1904.097485] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1904.109611] blktrace: Concurrent blktraces are not allowed on sg0 03:56:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:56:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:56:58 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:56:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000600)) 03:56:58 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) (fail_nth: 5) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1904.124370] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:56:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1d00}, 0x0) [ 1904.144418] FAULT_INJECTION: forcing a failure. [ 1904.144418] name failslab, interval 1, probability 0, space 0, times 0 [ 1904.145956] CPU: 1 PID: 10744 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1904.146841] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1904.147912] Call Trace: [ 1904.148261] dump_stack+0x107/0x167 [ 1904.148748] should_fail.cold+0x5/0xa [ 1904.149241] ? create_object.isra.0+0x3a/0xa20 [ 1904.149827] should_failslab+0x5/0x20 [ 1904.150320] kmem_cache_alloc+0x5b/0x310 [ 1904.150841] create_object.isra.0+0x3a/0xa20 [ 1904.151419] kmemleak_alloc_percpu+0xa0/0x100 [ 1904.151997] pcpu_alloc+0x4e2/0x1240 [ 1904.152489] do_blk_trace_setup+0x203/0xc10 [ 1904.153041] ? _copy_from_user+0xfb/0x1b0 [ 1904.153574] __blk_trace_setup+0xca/0x180 [ 1904.154101] ? do_blk_trace_setup+0xc10/0xc10 [ 1904.154685] ? perf_trace_lock+0xac/0x490 [ 1904.155221] ? SOFTIRQ_verbose+0x10/0x10 [ 1904.155689] blk_trace_setup+0x43/0x60 [ 1904.156084] sg_ioctl_common+0x634/0x2570 [ 1904.156500] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1904.157012] ? do_vfs_ioctl+0x283/0x10d0 [ 1904.157416] ? sg_write+0x120/0x120 [ 1904.157780] ? generic_block_fiemap+0x60/0x60 [ 1904.158228] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1904.158722] ? selinux_file_ioctl+0xb6/0x270 [ 1904.159174] ? sg_compat_ioctl+0x120/0x120 [ 1904.159594] sg_ioctl+0x8f/0x120 [ 1904.159932] __x64_sys_ioctl+0x19a/0x210 [ 1904.160346] do_syscall_64+0x33/0x40 [ 1904.160717] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1904.161225] RIP: 0033:0x7f1ac5591b19 [ 1904.161595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1904.163414] RSP: 002b:00007f1ac2b07188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1904.164169] RAX: ffffffffffffffda RBX: 00007f1ac56a4f60 RCX: 00007f1ac5591b19 [ 1904.164959] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1904.165755] RBP: 00007f1ac2b071d0 R08: 0000000000000000 R09: 0000000000000000 [ 1904.166548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1904.167345] R13: 00007ffd3b2574cf R14: 00007f1ac2b07300 R15: 0000000000022000 03:56:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:56:59 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1904.209293] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:56:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000600)) 03:56:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:56:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:56:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1e00}, 0x0) [ 1904.259555] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1904.265742] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:56:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1904.326366] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1904.343639] blktrace: Concurrent blktraces are not allowed on sg0 03:57:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x7a, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:57:11 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, 0x0) 03:57:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:57:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:57:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1f00}, 0x0) 03:57:11 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:11 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) (fail_nth: 6) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:11 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x5, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1916.915767] FAULT_INJECTION: forcing a failure. [ 1916.915767] name failslab, interval 1, probability 0, space 0, times 0 [ 1916.918463] CPU: 1 PID: 10786 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1916.920014] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1916.921844] Call Trace: [ 1916.922077] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1916.922442] dump_stack+0x107/0x167 [ 1916.924224] should_fail.cold+0x5/0xa [ 1916.925080] ? create_object.isra.0+0x3a/0xa20 [ 1916.926098] should_failslab+0x5/0x20 [ 1916.926948] kmem_cache_alloc+0x5b/0x310 [ 1916.927880] create_object.isra.0+0x3a/0xa20 [ 1916.928867] kmemleak_alloc_percpu+0xa0/0x100 [ 1916.929877] pcpu_alloc+0x4e2/0x1240 [ 1916.930735] do_blk_trace_setup+0x243/0xc10 [ 1916.931708] ? _copy_from_user+0xfb/0x1b0 [ 1916.932647] __blk_trace_setup+0xca/0x180 03:57:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1916.933583] ? do_blk_trace_setup+0xc10/0xc10 [ 1916.934696] ? perf_trace_lock+0xac/0x490 [ 1916.935633] ? SOFTIRQ_verbose+0x10/0x10 [ 1916.936546] blk_trace_setup+0x43/0x60 [ 1916.937421] sg_ioctl_common+0x634/0x2570 [ 1916.938352] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1916.939544] ? do_vfs_ioctl+0x283/0x10d0 [ 1916.940445] ? sg_write+0x120/0x120 [ 1916.941263] ? generic_block_fiemap+0x60/0x60 [ 1916.942268] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1916.943386] ? selinux_file_ioctl+0xb6/0x270 [ 1916.944360] ? sg_compat_ioctl+0x120/0x120 [ 1916.945303] sg_ioctl+0x8f/0x120 [ 1916.946068] __x64_sys_ioctl+0x19a/0x210 [ 1916.946981] do_syscall_64+0x33/0x40 [ 1916.947819] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1916.948964] RIP: 0033:0x7f1ac5591b19 [ 1916.949802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1916.953863] RSP: 002b:00007f1ac2b07188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1916.955573] RAX: ffffffffffffffda RBX: 00007f1ac56a4f60 RCX: 00007f1ac5591b19 [ 1916.957157] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1916.958741] RBP: 00007f1ac2b071d0 R08: 0000000000000000 R09: 0000000000000000 [ 1916.960328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1916.961908] R13: 00007ffd3b2574cf R14: 00007f1ac2b07300 R15: 0000000000022000 [ 1916.970764] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1916.982406] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:57:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1917.006797] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:57:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x2}, 0x0) [ 1917.039053] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.3'. 03:57:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:57:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1917.076810] blktrace: Concurrent blktraces are not allowed on sg0 [ 1917.078344] blktrace: Concurrent blktraces are not allowed on sg0 03:57:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x3}, 0x0) [ 1917.108666] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1917.117089] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.3'. 03:57:11 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x6, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:11 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0xd1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:57:11 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, 0x0) 03:57:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x8}, 0x0) [ 1917.215494] blktrace: Concurrent blktraces are not allowed on sg0 03:57:12 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) (fail_nth: 7) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 1917.279797] FAULT_INJECTION: forcing a failure. [ 1917.279797] name failslab, interval 1, probability 0, space 0, times 0 [ 1917.282659] CPU: 1 PID: 10832 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 1917.284211] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1917.286049] Call Trace: [ 1917.286649] dump_stack+0x107/0x167 [ 1917.287478] should_fail.cold+0x5/0xa [ 1917.288334] ? create_object.isra.0+0x3a/0xa20 [ 1917.289361] should_failslab+0x5/0x20 [ 1917.290217] kmem_cache_alloc+0x5b/0x310 [ 1917.291142] ? mark_held_locks+0x9e/0xe0 [ 1917.292057] create_object.isra.0+0x3a/0xa20 [ 1917.293049] kmemleak_alloc_percpu+0xa0/0x100 [ 1917.294054] pcpu_alloc+0x4e2/0x1240 [ 1917.294911] do_blk_trace_setup+0x243/0xc10 [ 1917.295884] ? _copy_from_user+0xfb/0x1b0 [ 1917.296809] __blk_trace_setup+0xca/0x180 [ 1917.297737] ? do_blk_trace_setup+0xc10/0xc10 [ 1917.298507] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1917.298744] ? perf_trace_lock+0xac/0x490 [ 1917.300687] ? SOFTIRQ_verbose+0x10/0x10 [ 1917.301599] blk_trace_setup+0x43/0x60 [ 1917.302471] sg_ioctl_common+0x634/0x2570 [ 1917.303420] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1917.304565] ? do_vfs_ioctl+0x283/0x10d0 [ 1917.305462] ? sg_write+0x120/0x120 [ 1917.306279] ? generic_block_fiemap+0x60/0x60 [ 1917.307295] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1917.308390] ? selinux_file_ioctl+0xb6/0x270 [ 1917.309365] ? sg_compat_ioctl+0x120/0x120 [ 1917.310303] sg_ioctl+0x8f/0x120 [ 1917.311087] __x64_sys_ioctl+0x19a/0x210 [ 1917.312004] do_syscall_64+0x33/0x40 [ 1917.312837] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1917.313975] RIP: 0033:0x7f1ac5591b19 [ 1917.314809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1917.318881] RSP: 002b:00007f1ac2b07188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1917.320587] RAX: ffffffffffffffda RBX: 00007f1ac56a4f60 RCX: 00007f1ac5591b19 [ 1917.322177] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1917.323779] RBP: 00007f1ac2b071d0 R08: 0000000000000000 R09: 0000000000000000 [ 1917.325369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1917.326955] R13: 00007ffd3b2574cf R14: 00007f1ac2b07300 R15: 0000000000022000 03:57:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0xff, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:57:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:57:25 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) (fail_nth: 8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, 0x0) 03:57:25 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x7, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x9}, 0x0) 03:57:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:57:25 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1930.816479] blktrace: Concurrent blktraces are not allowed on sg0 [ 1930.823869] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1930.847176] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1930.865771] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1930.873662] blktrace: Concurrent blktraces are not allowed on sg0 [ 1930.876688] blktrace: Concurrent blktraces are not allowed on sg0 03:57:25 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:57:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xa}, 0x0) [ 1931.008508] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1931.107115] blktrace: Concurrent blktraces are not allowed on sg0 03:57:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:57:46 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:57:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:57:46 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x300, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:46 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1951.495305] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:57:46 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x6, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:46 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xf}, 0x0) 03:57:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xf0}, 0x0) [ 1951.539416] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:57:46 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x1267, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1951.580432] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1951.594954] blktrace: Concurrent blktraces are not allowed on sg0 03:57:46 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 03:57:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x12a}, 0x0) [ 1951.623080] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 03:57:46 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x1274, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:46 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:57:46 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x500, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:01 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x600, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:01 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x2, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:58:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x1e4}, 0x0) 03:58:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1004, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:58:01 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x1267, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:01 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x1275, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:01 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1966.499771] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1966.537114] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x300}, 0x0) 03:58:01 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x2, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x68, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:58:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 1966.605697] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1966.632185] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:01 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1100, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:58:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x345}, 0x0) 03:58:01 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x1276, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:01 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1966.769028] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1966.837840] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:16 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:16 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x700, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x4, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:58:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:58:16 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2201, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:16 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481278, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:16 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x600, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x900}, 0x0) [ 1981.948624] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xa00}, 0x0) [ 1981.994274] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:16 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:16 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2202, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xf00}, 0x0) 03:58:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1ce6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:58:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 03:58:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 1) [ 1982.225509] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1982.246583] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1982.277355] FAULT_INJECTION: forcing a failure. [ 1982.277355] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1982.279762] CPU: 0 PID: 11032 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 1982.281176] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1982.282867] Call Trace: [ 1982.283431] dump_stack+0x107/0x167 [ 1982.284200] should_fail.cold+0x5/0xa [ 1982.284990] _copy_from_user+0x2e/0x1b0 [ 1982.285800] __copy_msghdr_from_user+0x91/0x4b0 [ 1982.286746] ? __ia32_sys_shutdown+0x80/0x80 [ 1982.287644] ? perf_trace_lock+0xac/0x490 [ 1982.288525] ? __lock_acquire+0x1657/0x5b00 [ 1982.289399] ? __lock_acquire+0xbb1/0x5b00 [ 1982.290257] sendmsg_copy_msghdr+0xa1/0x160 [ 1982.291125] ? do_recvmmsg+0x6d0/0x6d0 [ 1982.291968] ? perf_trace_lock+0xac/0x490 [ 1982.292819] ? __lockdep_reset_lock+0x180/0x180 [ 1982.293768] ? perf_trace_lock+0xac/0x490 [ 1982.294620] ___sys_sendmsg+0xc6/0x170 [ 1982.295422] ? sendmsg_copy_msghdr+0x160/0x160 [ 1982.296377] ? __fget_files+0x26d/0x4c0 [ 1982.297178] ? lock_downgrade+0x6d0/0x6d0 [ 1982.298012] ? find_held_lock+0x2c/0x110 [ 1982.298844] ? __fget_files+0x296/0x4c0 [ 1982.299664] ? __fget_light+0xea/0x290 [ 1982.300476] __sys_sendmsg+0xe5/0x1b0 [ 1982.301249] ? __sys_sendmsg_sock+0x40/0x40 [ 1982.302122] ? rcu_read_lock_any_held+0x75/0xa0 [ 1982.303071] ? fput_many+0x2f/0x1a0 [ 1982.303803] ? ksys_write+0x1a9/0x260 [ 1982.304610] ? __ia32_sys_read+0xb0/0xb0 [ 1982.305449] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1982.306542] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1982.307579] ? trace_hardirqs_on+0x5b/0x180 [ 1982.308526] do_syscall_64+0x33/0x40 [ 1982.309276] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1982.310325] RIP: 0033:0x7fb362bacb19 [ 1982.311073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1982.314792] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1982.316419] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 1982.317918] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 1982.319404] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 1982.320902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1982.322388] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 03:58:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 1982.425109] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1982.450072] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:58:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x2000}, 0x0) 03:58:31 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x5, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:58:31 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2203, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:31 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:31 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x172b, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 2) 03:58:31 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x700, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1997.013451] FAULT_INJECTION: forcing a failure. [ 1997.013451] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1997.016649] CPU: 0 PID: 11049 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 1997.018188] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1997.020044] Call Trace: [ 1997.020641] dump_stack+0x107/0x167 [ 1997.021456] should_fail.cold+0x5/0xa [ 1997.022314] _copy_from_user+0x2e/0x1b0 [ 1997.023199] iovec_from_user+0x141/0x400 [ 1997.024124] __import_iovec+0x67/0x590 [ 1997.024985] ? __ia32_sys_shutdown+0x80/0x80 [ 1997.025958] ? perf_trace_lock+0xac/0x490 [ 1997.026887] import_iovec+0x83/0xb0 [ 1997.027700] sendmsg_copy_msghdr+0x131/0x160 [ 1997.028686] ? do_recvmmsg+0x6d0/0x6d0 [ 1997.029549] ? perf_trace_lock+0xac/0x490 [ 1997.030478] ? __lockdep_reset_lock+0x180/0x180 [ 1997.031502] ? perf_trace_lock+0xac/0x490 [ 1997.032440] ? SOFTIRQ_verbose+0x10/0x10 [ 1997.033359] ___sys_sendmsg+0xc6/0x170 [ 1997.034236] ? sendmsg_copy_msghdr+0x160/0x160 [ 1997.035250] ? __fget_files+0x26d/0x4c0 [ 1997.036150] ? lock_downgrade+0x6d0/0x6d0 [ 1997.037073] ? find_held_lock+0x2c/0x110 [ 1997.037996] ? __fget_files+0x296/0x4c0 [ 1997.038888] ? __fget_light+0xea/0x290 [ 1997.039758] __sys_sendmsg+0xe5/0x1b0 03:58:31 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1997.040822] ? __sys_sendmsg_sock+0x40/0x40 [ 1997.041978] ? rcu_read_lock_any_held+0x75/0xa0 [ 1997.043125] ? fput_many+0x2f/0x1a0 [ 1997.044015] ? ksys_write+0x1a9/0x260 [ 1997.044982] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1997.046264] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1997.046781] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 1997.047525] ? trace_hardirqs_on+0x5b/0x180 [ 1997.047554] do_syscall_64+0x33/0x40 [ 1997.050379] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1997.051636] RIP: 0033:0x7fb362bacb19 [ 1997.052576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1997.054997] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1997.055902] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 1997.056735] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 1997.057591] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 1997.058436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1997.059281] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 1997.091822] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x2a01}, 0x0) 03:58:31 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2205, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:31 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) (fail_nth: 1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:58:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 3) 03:58:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:58:32 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x2b17, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 1997.240571] FAULT_INJECTION: forcing a failure. [ 1997.240571] name failslab, interval 1, probability 0, space 0, times 0 [ 1997.241908] CPU: 1 PID: 11073 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 1997.242686] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1997.243607] Call Trace: [ 1997.243918] dump_stack+0x107/0x167 [ 1997.244358] should_fail.cold+0x5/0xa [ 1997.244802] ? __alloc_skb+0x6d/0x5b0 [ 1997.245257] should_failslab+0x5/0x20 [ 1997.245691] kmem_cache_alloc_node+0x55/0x330 [ 1997.246212] __alloc_skb+0x6d/0x5b0 [ 1997.246640] netlink_sendmsg+0x998/0xdf0 [ 1997.247147] ? netlink_unicast+0x7f0/0x7f0 [ 1997.247658] ? netlink_unicast+0x7f0/0x7f0 [ 1997.248143] sock_sendmsg+0x154/0x190 [ 1997.248597] ____sys_sendmsg+0x70d/0x870 [ 1997.249072] ? kernel_sendmsg+0x50/0x50 [ 1997.249523] ? do_recvmmsg+0x6d0/0x6d0 [ 1997.249954] ? perf_trace_lock+0xac/0x490 [ 1997.250432] ? __lockdep_reset_lock+0x180/0x180 [ 1997.250958] ? perf_trace_lock+0xac/0x490 [ 1997.251425] ? SOFTIRQ_verbose+0x10/0x10 [ 1997.251874] ___sys_sendmsg+0xf3/0x170 [ 1997.252325] ? sendmsg_copy_msghdr+0x160/0x160 [ 1997.252830] ? lock_downgrade+0x6d0/0x6d0 [ 1997.253305] ? find_held_lock+0x2c/0x110 [ 1997.253762] ? __fget_files+0x296/0x4c0 [ 1997.254213] ? __fget_light+0xea/0x290 [ 1997.254654] __sys_sendmsg+0xe5/0x1b0 [ 1997.255099] ? __sys_sendmsg_sock+0x40/0x40 [ 1997.255599] ? rcu_read_lock_any_held+0x75/0xa0 [ 1997.256163] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1997.256504] FAULT_INJECTION: forcing a failure. [ 1997.256504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1997.256780] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1997.256801] ? trace_hardirqs_on+0x5b/0x180 [ 1997.260273] do_syscall_64+0x33/0x40 [ 1997.260687] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1997.261253] RIP: 0033:0x7fb362bacb19 [ 1997.261659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1997.263692] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1997.264554] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 1997.265335] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 1997.266148] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 1997.266921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1997.267724] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 1997.268551] CPU: 0 PID: 11072 Comm: syz-executor.0 Not tainted 5.10.184 #1 [ 1997.270012] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1997.271755] Call Trace: [ 1997.272324] dump_stack+0x107/0x167 [ 1997.273099] should_fail.cold+0x5/0xa [ 1997.273903] _copy_from_user+0x2e/0x1b0 [ 1997.274740] __blk_trace_setup+0x96/0x180 [ 1997.275609] ? do_blk_trace_setup+0xc10/0xc10 [ 1997.276581] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1997.277692] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1997.278820] ? trace_hardirqs_on+0x5b/0x180 [ 1997.279730] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1997.280887] blk_trace_setup+0x43/0x60 [ 1997.281718] sg_ioctl_common+0x634/0x2570 [ 1997.282586] ? do_vfs_ioctl+0x283/0x10d0 [ 1997.283438] ? sg_write+0x120/0x120 [ 1997.284214] ? generic_block_fiemap+0x60/0x60 [ 1997.285152] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1997.286184] ? selinux_file_ioctl+0xb6/0x270 [ 1997.287097] ? sg_compat_ioctl+0x120/0x120 [ 1997.287986] sg_ioctl+0x8f/0x120 [ 1997.288717] __x64_sys_ioctl+0x19a/0x210 [ 1997.289578] do_syscall_64+0x33/0x40 [ 1997.290361] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1997.291435] RIP: 0033:0x7f13c2569b19 [ 1997.292220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1997.296090] RSP: 002b:00007f13bfadf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1997.297676] RAX: ffffffffffffffda RBX: 00007f13c267cf60 RCX: 00007f13c2569b19 [ 1997.299178] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1997.300672] RBP: 00007f13bfadf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1997.302155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1997.303638] R13: 00007ffe21a3d81f R14: 00007f13bfadf300 R15: 0000000000022000 [ 1997.324884] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x4000}, 0x0) [ 1997.353103] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:46 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:46 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:58:46 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x42f, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x4503}, 0x0) 03:58:46 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2270, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:58:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) (fail_nth: 2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:58:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 4) [ 2011.396356] FAULT_INJECTION: forcing a failure. [ 2011.396356] name failslab, interval 1, probability 0, space 0, times 0 [ 2011.398892] CPU: 0 PID: 11108 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2011.400460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2011.402308] Call Trace: [ 2011.402911] dump_stack+0x107/0x167 [ 2011.403733] should_fail.cold+0x5/0xa [ 2011.404622] ? create_object.isra.0+0x3a/0xa20 [ 2011.405639] should_failslab+0x5/0x20 [ 2011.406480] kmem_cache_alloc+0x5b/0x310 [ 2011.407389] create_object.isra.0+0x3a/0xa20 [ 2011.408387] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2011.409517] kmem_cache_alloc_node+0x169/0x330 [ 2011.410529] __alloc_skb+0x6d/0x5b0 [ 2011.411344] netlink_sendmsg+0x998/0xdf0 [ 2011.412267] ? netlink_unicast+0x7f0/0x7f0 [ 2011.413221] ? netlink_unicast+0x7f0/0x7f0 [ 2011.414153] sock_sendmsg+0x154/0x190 [ 2011.414998] ____sys_sendmsg+0x70d/0x870 [ 2011.415903] ? kernel_sendmsg+0x50/0x50 [ 2011.416832] ? do_recvmmsg+0x6d0/0x6d0 [ 2011.417691] ? perf_trace_lock+0xac/0x490 [ 2011.418610] ? __lockdep_reset_lock+0x180/0x180 [ 2011.419632] ? perf_trace_lock+0xac/0x490 [ 2011.420575] ___sys_sendmsg+0xf3/0x170 [ 2011.421436] ? sendmsg_copy_msghdr+0x160/0x160 [ 2011.422452] ? lock_downgrade+0x6d0/0x6d0 [ 2011.423372] ? find_held_lock+0x2c/0x110 [ 2011.424303] ? __fget_files+0x296/0x4c0 [ 2011.425191] ? __fget_light+0xea/0x290 [ 2011.426055] __sys_sendmsg+0xe5/0x1b0 [ 2011.426908] ? __sys_sendmsg_sock+0x40/0x40 [ 2011.427866] ? rcu_read_lock_any_held+0x75/0xa0 [ 2011.428952] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2011.430116] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2011.431251] ? trace_hardirqs_on+0x5b/0x180 [ 2011.432215] do_syscall_64+0x33/0x40 [ 2011.433053] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2011.434187] RIP: 0033:0x7fb362bacb19 [ 2011.435008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2011.439109] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2011.440817] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2011.442386] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2011.443958] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2011.445551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2011.447127] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 03:58:46 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2271, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:46 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2011.458627] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2011.484798] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xe401}, 0x0) [ 2011.520404] blktrace: Concurrent blktraces are not allowed on sg0 03:58:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2011.523635] FAULT_INJECTION: forcing a failure. [ 2011.523635] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2011.526927] CPU: 0 PID: 11107 Comm: syz-executor.0 Not tainted 5.10.184 #1 [ 2011.528347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2011.530017] Call Trace: [ 2011.530669] dump_stack+0x107/0x167 [ 2011.531415] should_fail.cold+0x5/0xa [ 2011.532366] _copy_to_user+0x2e/0x180 [ 2011.533162] simple_read_from_buffer+0xcc/0x160 [ 2011.534405] proc_fail_nth_read+0x198/0x230 [ 2011.535404] ? proc_sessionid_read+0x230/0x230 [ 2011.536669] ? security_file_permission+0x24e/0x570 [ 2011.537808] ? perf_trace_initcall_start+0x101/0x380 [ 2011.539206] ? proc_sessionid_read+0x230/0x230 [ 2011.540257] vfs_read+0x228/0x580 [ 2011.541222] ksys_read+0x12d/0x260 [ 2011.542045] ? vfs_write+0xa70/0xa70 [ 2011.543068] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2011.544290] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2011.545697] do_syscall_64+0x33/0x40 [ 2011.546558] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2011.547953] RIP: 0033:0x7f13c251c69c [ 2011.548822] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2011.553141] RSP: 002b:00007f13bfadf170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2011.554865] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f13c251c69c [ 2011.556499] RDX: 000000000000000f RSI: 00007f13bfadf1e0 RDI: 0000000000000005 [ 2011.558128] RBP: 00007f13bfadf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2011.559736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2011.561378] R13: 00007ffe21a3d81f R14: 00007f13bfadf300 R15: 0000000000022000 [ 2011.573037] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x7, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:58:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xf000}, 0x0) 03:58:57 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x445, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:58:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 5) 03:58:57 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2272, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:57 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x0, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2023.114718] FAULT_INJECTION: forcing a failure. [ 2023.114718] name failslab, interval 1, probability 0, space 0, times 0 [ 2023.116078] CPU: 1 PID: 11151 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2023.116868] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2023.117785] Call Trace: [ 2023.118094] dump_stack+0x107/0x167 [ 2023.118511] should_fail.cold+0x5/0xa [ 2023.118952] should_failslab+0x5/0x20 [ 2023.119371] __kmalloc_node_track_caller+0x74/0x3b0 [ 2023.119913] ? netlink_sendmsg+0x998/0xdf0 [ 2023.120397] __alloc_skb+0xb1/0x5b0 [ 2023.120806] netlink_sendmsg+0x998/0xdf0 [ 2023.121265] ? netlink_unicast+0x7f0/0x7f0 [ 2023.121743] ? netlink_unicast+0x7f0/0x7f0 [ 2023.122206] sock_sendmsg+0x154/0x190 [ 2023.122639] ____sys_sendmsg+0x70d/0x870 [ 2023.123084] ? kernel_sendmsg+0x50/0x50 [ 2023.123534] ? do_recvmmsg+0x6d0/0x6d0 [ 2023.123978] ? perf_trace_lock+0xac/0x490 [ 2023.124463] ? __lockdep_reset_lock+0x180/0x180 [ 2023.124987] ? perf_trace_lock+0xac/0x490 [ 2023.125485] ___sys_sendmsg+0xf3/0x170 [ 2023.125948] ? sendmsg_copy_msghdr+0x160/0x160 [ 2023.126486] ? lock_downgrade+0x6d0/0x6d0 [ 2023.126971] ? find_held_lock+0x2c/0x110 [ 2023.127439] ? __fget_files+0x296/0x4c0 [ 2023.127884] ? __fget_light+0xea/0x290 [ 2023.128343] __sys_sendmsg+0xe5/0x1b0 [ 2023.128793] ? __sys_sendmsg_sock+0x40/0x40 [ 2023.129293] ? rcu_read_lock_any_held+0x75/0xa0 [ 2023.129831] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2023.130431] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2023.131005] ? trace_hardirqs_on+0x5b/0x180 [ 2023.131492] do_syscall_64+0x33/0x40 [ 2023.131914] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2023.132498] RIP: 0033:0x7fb362bacb19 [ 2023.132921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2023.133469] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2023.134932] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2023.134944] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2023.134951] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2023.134957] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2023.134963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2023.134970] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2023.171117] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x34000}, 0x0) 03:58:57 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2275, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4201, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:58:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x80000}, 0x0) [ 2023.266717] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:58 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x0, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:58:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4301, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:58:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:58:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 6) [ 2023.357126] FAULT_INJECTION: forcing a failure. [ 2023.357126] name failslab, interval 1, probability 0, space 0, times 0 [ 2023.359591] CPU: 0 PID: 11177 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2023.361048] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2023.362784] Call Trace: [ 2023.363354] dump_stack+0x107/0x167 [ 2023.364125] should_fail.cold+0x5/0xa [ 2023.364943] ? create_object.isra.0+0x3a/0xa20 [ 2023.365905] should_failslab+0x5/0x20 [ 2023.366718] kmem_cache_alloc+0x5b/0x310 [ 2023.367583] create_object.isra.0+0x3a/0xa20 [ 2023.368518] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2023.369590] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2023.370661] ? netlink_sendmsg+0x998/0xdf0 [ 2023.371567] __alloc_skb+0xb1/0x5b0 [ 2023.372332] netlink_sendmsg+0x998/0xdf0 [ 2023.373194] ? netlink_unicast+0x7f0/0x7f0 [ 2023.374101] ? netlink_unicast+0x7f0/0x7f0 [ 2023.374981] sock_sendmsg+0x154/0x190 [ 2023.375796] ____sys_sendmsg+0x70d/0x870 [ 2023.376680] ? kernel_sendmsg+0x50/0x50 [ 2023.377511] ? do_recvmmsg+0x6d0/0x6d0 [ 2023.378328] ? perf_trace_lock+0xac/0x490 [ 2023.379209] ? __lockdep_reset_lock+0x180/0x180 [ 2023.380187] ? perf_trace_lock+0xac/0x490 [ 2023.381073] ___sys_sendmsg+0xf3/0x170 [ 2023.381888] ? sendmsg_copy_msghdr+0x160/0x160 [ 2023.382870] ? lock_downgrade+0x6d0/0x6d0 [ 2023.383744] ? find_held_lock+0x2c/0x110 [ 2023.384634] ? __fget_files+0x296/0x4c0 [ 2023.385486] ? __fget_light+0xea/0x290 [ 2023.386315] __sys_sendmsg+0xe5/0x1b0 [ 2023.387116] ? __sys_sendmsg_sock+0x40/0x40 [ 2023.388019] ? rcu_read_lock_any_held+0x75/0xa0 [ 2023.389031] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2023.390136] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2023.391217] ? trace_hardirqs_on+0x5b/0x180 [ 2023.392136] do_syscall_64+0x33/0x40 [ 2023.392934] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2023.394014] RIP: 0033:0x7fb362bacb19 [ 2023.394796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2023.398648] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2023.400239] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2023.401735] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2023.403226] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2023.404729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2023.406223] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2023.430671] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2023.449119] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:58:58 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0xc, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:58:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x400300}, 0x0) 03:59:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:59:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1267, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:59:14 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2276, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 7) [ 2039.395548] FAULT_INJECTION: forcing a failure. [ 2039.395548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2039.398029] CPU: 1 PID: 11206 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2039.399444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2039.401118] Call Trace: [ 2039.401667] dump_stack+0x107/0x167 [ 2039.402406] should_fail.cold+0x5/0xa [ 2039.403200] _copy_from_iter_full+0x201/0xa60 [ 2039.404108] ? __virt_addr_valid+0x128/0x350 [ 2039.405025] ? __check_object_size+0x319/0x440 [ 2039.405957] netlink_sendmsg+0x879/0xdf0 [ 2039.406790] ? netlink_unicast+0x7f0/0x7f0 [ 2039.407657] ? netlink_unicast+0x7f0/0x7f0 [ 2039.408516] sock_sendmsg+0x154/0x190 [ 2039.409306] ____sys_sendmsg+0x70d/0x870 [ 2039.410139] ? kernel_sendmsg+0x50/0x50 [ 2039.410939] ? do_recvmmsg+0x6d0/0x6d0 [ 2039.411731] ? perf_trace_lock+0xac/0x490 [ 2039.412586] ? __lockdep_reset_lock+0x180/0x180 [ 2039.413537] ? perf_trace_lock+0xac/0x490 [ 2039.414378] ___sys_sendmsg+0xf3/0x170 03:59:14 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x22, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:59:14 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x4}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xf0ffff}, 0x0) 03:59:14 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x0, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2039.415178] ? sendmsg_copy_msghdr+0x160/0x160 [ 2039.416275] ? lock_downgrade+0x6d0/0x6d0 [ 2039.417137] ? find_held_lock+0x2c/0x110 [ 2039.417978] ? __fget_files+0x296/0x4c0 [ 2039.418795] ? __fget_light+0xea/0x290 [ 2039.419604] __sys_sendmsg+0xe5/0x1b0 [ 2039.420384] ? __sys_sendmsg_sock+0x40/0x40 [ 2039.421282] ? rcu_read_lock_any_held+0x75/0xa0 [ 2039.422261] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2039.423336] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2039.424391] ? trace_hardirqs_on+0x5b/0x180 [ 2039.425289] do_syscall_64+0x33/0x40 [ 2039.426055] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2039.427106] RIP: 0033:0x7fb362bacb19 [ 2039.427884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2039.431675] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2039.433224] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2039.434676] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2039.436122] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2039.437583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2039.439033] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2039.477007] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:59:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1274, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2039.523227] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:59:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x1000000}, 0x0) 03:59:14 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2279, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:59:14 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x2000000}, 0x0) 03:59:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 8) [ 2039.759158] FAULT_INJECTION: forcing a failure. [ 2039.759158] name failslab, interval 1, probability 0, space 0, times 0 [ 2039.761576] CPU: 0 PID: 11242 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2039.762995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2039.764709] Call Trace: [ 2039.765257] dump_stack+0x107/0x167 [ 2039.766008] should_fail.cold+0x5/0xa [ 2039.766788] ? xfrm_state_alloc+0x21/0x4e0 [ 2039.767655] should_failslab+0x5/0x20 [ 2039.768436] kmem_cache_alloc+0x5b/0x310 [ 2039.769272] ? __nla_validate_parse+0x2d8/0x2b10 [ 2039.770239] xfrm_state_alloc+0x21/0x4e0 [ 2039.771065] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2039.772131] xfrm_add_sa+0xd3b/0x3510 [ 2039.772930] ? xfrm_send_acquire+0xa50/0xa50 [ 2039.773833] ? security_capable+0x95/0xc0 [ 2039.774676] ? __nla_parse+0x3e/0x50 [ 2039.775436] ? xfrm_send_acquire+0xa50/0xa50 [ 2039.776337] xfrm_user_rcv_msg+0x416/0x830 [ 2039.777217] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2039.778226] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2039.779293] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2039.780204] ? trace_hardirqs_on+0x5b/0x180 [ 2039.781087] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2039.782000] ? finish_task_switch+0x126/0x5d0 [ 2039.782950] ? __mutex_lock+0x4fe/0x10b0 [ 2039.783779] ? __lockdep_reset_lock+0x180/0x180 [ 2039.784737] netlink_rcv_skb+0x14b/0x430 [ 2039.785565] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2039.786578] ? netlink_ack+0xab0/0xab0 [ 2039.787404] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2039.788361] xfrm_netlink_rcv+0x6b/0x90 [ 2039.789188] netlink_unicast+0x549/0x7f0 [ 2039.790029] ? netlink_attachskb+0x870/0x870 [ 2039.790920] ? __virt_addr_valid+0x128/0x350 [ 2039.791826] netlink_sendmsg+0x90f/0xdf0 [ 2039.792671] ? netlink_unicast+0x7f0/0x7f0 [ 2039.793547] ? netlink_unicast+0x7f0/0x7f0 [ 2039.794407] sock_sendmsg+0x154/0x190 [ 2039.795184] ____sys_sendmsg+0x70d/0x870 [ 2039.796009] ? kernel_sendmsg+0x50/0x50 [ 2039.796821] ? do_recvmmsg+0x6d0/0x6d0 [ 2039.797611] ? perf_trace_lock+0xac/0x490 [ 2039.798464] ? __lockdep_reset_lock+0x180/0x180 [ 2039.799401] ? perf_trace_lock+0xac/0x490 [ 2039.800249] ___sys_sendmsg+0xf3/0x170 [ 2039.801055] ? sendmsg_copy_msghdr+0x160/0x160 [ 2039.801999] ? lock_downgrade+0x6d0/0x6d0 [ 2039.802853] ? find_held_lock+0x2c/0x110 [ 2039.803687] ? __fget_files+0x296/0x4c0 [ 2039.804506] ? __fget_light+0xea/0x290 [ 2039.805309] __sys_sendmsg+0xe5/0x1b0 [ 2039.806083] ? __sys_sendmsg_sock+0x40/0x40 [ 2039.806957] ? rcu_read_lock_any_held+0x75/0xa0 [ 2039.807919] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2039.808999] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2039.810046] ? trace_hardirqs_on+0x5b/0x180 [ 2039.810924] do_syscall_64+0x33/0x40 [ 2039.811681] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2039.812729] RIP: 0033:0x7fb362bacb19 [ 2039.813485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2039.817230] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2039.818777] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2039.820224] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2039.821669] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2039.823119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2039.824579] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 03:59:14 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227a, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:14 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x45}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1275, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:59:14 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x23, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2039.859808] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2039.897218] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:59:27 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 9) [ 2052.842778] FAULT_INJECTION: forcing a failure. [ 2052.842778] name failslab, interval 1, probability 0, space 0, times 0 [ 2052.845206] CPU: 0 PID: 11267 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2052.846668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2052.848425] Call Trace: 03:59:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x3000000}, 0x0) [ 2052.849004] dump_stack+0x107/0x167 03:59:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2052.849872] should_fail.cold+0x5/0xa [ 2052.850694] ? avc_has_extended_perms+0xf40/0xf40 [ 2052.851679] ? create_object.isra.0+0x3a/0xa20 [ 2052.852621] should_failslab+0x5/0x20 [ 2052.853410] kmem_cache_alloc+0x5b/0x310 [ 2052.854246] create_object.isra.0+0x3a/0xa20 [ 2052.855145] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2052.856184] kmem_cache_alloc+0x159/0x310 [ 2052.857074] xfrm_state_alloc+0x21/0x4e0 [ 2052.857920] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2052.858988] xfrm_add_sa+0xd3b/0x3510 [ 2052.859819] ? xfrm_send_acquire+0xa50/0xa50 03:59:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1276, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:59:27 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227b, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:27 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x2}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2052.860746] ? security_capable+0x95/0xc0 [ 2052.861695] ? __nla_parse+0x3e/0x50 [ 2052.862475] ? xfrm_send_acquire+0xa50/0xa50 [ 2052.863370] xfrm_user_rcv_msg+0x416/0x830 [ 2052.864262] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2052.865357] ? __mutex_lock+0x4fe/0x10b0 [ 2052.866182] ? __lockdep_reset_lock+0x180/0x180 [ 2052.867132] netlink_rcv_skb+0x14b/0x430 [ 2052.867957] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2052.868981] ? netlink_ack+0xab0/0xab0 [ 2052.869781] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2052.870718] xfrm_netlink_rcv+0x6b/0x90 [ 2052.871527] netlink_unicast+0x549/0x7f0 [ 2052.872380] ? netlink_attachskb+0x870/0x870 [ 2052.873280] ? __virt_addr_valid+0x128/0x350 [ 2052.874212] netlink_sendmsg+0x90f/0xdf0 [ 2052.875052] ? netlink_unicast+0x7f0/0x7f0 [ 2052.875922] ? netlink_unicast+0x7f0/0x7f0 [ 2052.876824] sock_sendmsg+0x154/0x190 [ 2052.877602] ____sys_sendmsg+0x70d/0x870 [ 2052.878450] ? kernel_sendmsg+0x50/0x50 [ 2052.879261] ? do_recvmmsg+0x6d0/0x6d0 [ 2052.880069] ? perf_trace_lock+0xac/0x490 [ 2052.880934] ? __lockdep_reset_lock+0x180/0x180 [ 2052.881871] ? perf_trace_lock+0xac/0x490 [ 2052.882713] ___sys_sendmsg+0xf3/0x170 [ 2052.883505] ? sendmsg_copy_msghdr+0x160/0x160 [ 2052.884432] ? lock_downgrade+0x6d0/0x6d0 [ 2052.885290] ? find_held_lock+0x2c/0x110 [ 2052.886128] ? __fget_files+0x296/0x4c0 [ 2052.886945] ? __fget_light+0xea/0x290 [ 2052.887757] __sys_sendmsg+0xe5/0x1b0 [ 2052.888530] ? __sys_sendmsg_sock+0x40/0x40 [ 2052.889413] ? rcu_read_lock_any_held+0x75/0xa0 [ 2052.890377] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2052.891439] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2052.892488] ? trace_hardirqs_on+0x5b/0x180 [ 2052.893374] do_syscall_64+0x33/0x40 [ 2052.894132] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2052.895166] RIP: 0033:0x7fb362bacb19 [ 2052.895923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2052.899624] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2052.901155] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2052.902587] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2052.904023] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2052.905472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2052.906907] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 03:59:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x27, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:59:27 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2052.981498] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2053.065663] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:59:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 10) 03:59:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x9000000}, 0x0) [ 2053.142818] FAULT_INJECTION: forcing a failure. [ 2053.142818] name failslab, interval 1, probability 0, space 0, times 0 [ 2053.145091] CPU: 1 PID: 11295 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2053.146443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2053.148070] Call Trace: [ 2053.148578] dump_stack+0x107/0x167 [ 2053.149292] should_fail.cold+0x5/0xa [ 2053.150044] should_failslab+0x5/0x20 [ 2053.150787] __kmalloc_track_caller+0x79/0x370 [ 2053.151681] ? xfrm_add_sa+0x1314/0x3510 [ 2053.152480] kmemdup+0x23/0x50 [ 2053.153110] xfrm_add_sa+0x1314/0x3510 [ 2053.153847] ? xfrm_send_acquire+0xa50/0xa50 [ 2053.154683] ? security_capable+0x95/0xc0 [ 2053.155465] ? __nla_parse+0x3e/0x50 [ 2053.156164] ? xfrm_send_acquire+0xa50/0xa50 [ 2053.156998] xfrm_user_rcv_msg+0x416/0x830 [ 2053.157795] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2053.158775] ? __mutex_lock+0x4fe/0x10b0 [ 2053.159541] ? __lockdep_reset_lock+0x180/0x180 [ 2053.160418] netlink_rcv_skb+0x14b/0x430 [ 2053.161198] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2053.162145] ? netlink_ack+0xab0/0xab0 [ 2053.162884] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2053.163747] xfrm_netlink_rcv+0x6b/0x90 [ 2053.164497] netlink_unicast+0x549/0x7f0 [ 2053.165280] ? netlink_attachskb+0x870/0x870 [ 2053.166098] ? __virt_addr_valid+0x128/0x350 [ 2053.166946] netlink_sendmsg+0x90f/0xdf0 [ 2053.167712] ? netlink_unicast+0x7f0/0x7f0 [ 2053.168531] ? netlink_unicast+0x7f0/0x7f0 [ 2053.169322] sock_sendmsg+0x154/0x190 [ 2053.170035] ____sys_sendmsg+0x70d/0x870 [ 2053.170794] ? kernel_sendmsg+0x50/0x50 [ 2053.171550] ? do_recvmmsg+0x6d0/0x6d0 [ 2053.172277] ? perf_trace_lock+0xac/0x490 [ 2053.173084] ? __lockdep_reset_lock+0x180/0x180 [ 2053.173953] ? perf_trace_lock+0xac/0x490 [ 2053.174724] ___sys_sendmsg+0xf3/0x170 [ 2053.175454] ? sendmsg_copy_msghdr+0x160/0x160 [ 2053.176305] ? lock_downgrade+0x6d0/0x6d0 [ 2053.177094] ? find_held_lock+0x2c/0x110 [ 2053.177856] ? __fget_files+0x296/0x4c0 [ 2053.178610] ? __fget_light+0xea/0x290 [ 2053.179342] __sys_sendmsg+0xe5/0x1b0 [ 2053.180056] ? __sys_sendmsg_sock+0x40/0x40 [ 2053.180862] ? rcu_read_lock_any_held+0x75/0xa0 [ 2053.181739] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2053.182711] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2053.183669] ? trace_hardirqs_on+0x5b/0x180 [ 2053.184473] do_syscall_64+0x33/0x40 [ 2053.185192] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2053.186146] RIP: 0033:0x7fb362bacb19 [ 2053.186840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2053.190194] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2053.191584] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2053.192894] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2053.194200] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2053.195495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2053.196809] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 03:59:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2201, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:59:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:59:28 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:28 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227c, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xa000000}, 0x0) [ 2067.230310] FAULT_INJECTION: forcing a failure. [ 2067.230310] name failslab, interval 1, probability 0, space 0, times 0 [ 2067.231593] CPU: 1 PID: 11326 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2067.232357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2067.233252] Call Trace: [ 2067.233548] dump_stack+0x107/0x167 [ 2067.233940] should_fail.cold+0x5/0xa [ 2067.234363] ? create_object.isra.0+0x3a/0xa20 [ 2067.234858] should_failslab+0x5/0x20 [ 2067.235268] kmem_cache_alloc+0x5b/0x310 [ 2067.235711] create_object.isra.0+0x3a/0xa20 [ 2067.236184] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2067.236734] __kmalloc_track_caller+0x177/0x370 [ 2067.237252] ? xfrm_add_sa+0x1314/0x3510 [ 2067.237698] kmemdup+0x23/0x50 [ 2067.238046] xfrm_add_sa+0x1314/0x3510 [ 2067.238467] ? xfrm_send_acquire+0xa50/0xa50 [ 2067.238949] ? security_capable+0x95/0xc0 [ 2067.239406] ? __nla_parse+0x3e/0x50 [ 2067.239828] ? xfrm_send_acquire+0xa50/0xa50 [ 2067.240310] xfrm_user_rcv_msg+0x416/0x830 [ 2067.240787] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2067.241379] ? __mutex_lock+0x4fe/0x10b0 [ 2067.241848] ? __lockdep_reset_lock+0x180/0x180 [ 2067.242346] netlink_rcv_skb+0x14b/0x430 [ 2067.242807] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2067.243339] ? netlink_ack+0xab0/0xab0 [ 2067.243791] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2067.244284] xfrm_netlink_rcv+0x6b/0x90 [ 2067.244729] netlink_unicast+0x549/0x7f0 [ 2067.245173] ? netlink_attachskb+0x870/0x870 [ 2067.245662] ? __virt_addr_valid+0x128/0x350 [ 2067.246141] netlink_sendmsg+0x90f/0xdf0 [ 2067.246604] ? netlink_unicast+0x7f0/0x7f0 [ 2067.247114] ? netlink_unicast+0x7f0/0x7f0 [ 2067.247584] sock_sendmsg+0x154/0x190 [ 2067.247991] ____sys_sendmsg+0x70d/0x870 [ 2067.248443] ? kernel_sendmsg+0x50/0x50 [ 2067.248862] ? do_recvmmsg+0x6d0/0x6d0 [ 2067.249313] ? perf_trace_lock+0xac/0x490 [ 2067.249772] ? __lockdep_reset_lock+0x180/0x180 [ 2067.250280] ? perf_trace_lock+0xac/0x490 [ 2067.250718] ___sys_sendmsg+0xf3/0x170 [ 2067.251153] ? sendmsg_copy_msghdr+0x160/0x160 [ 2067.251663] ? lock_downgrade+0x6d0/0x6d0 [ 2067.252103] ? find_held_lock+0x2c/0x110 [ 2067.252559] ? __fget_files+0x296/0x4c0 [ 2067.253014] ? __fget_light+0xea/0x290 [ 2067.253451] __sys_sendmsg+0xe5/0x1b0 [ 2067.253873] ? __sys_sendmsg_sock+0x40/0x40 [ 2067.254337] ? rcu_read_lock_any_held+0x75/0xa0 [ 2067.254867] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2067.255452] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2067.256026] ? trace_hardirqs_on+0x5b/0x180 [ 2067.256505] do_syscall_64+0x33/0x40 [ 2067.256926] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2067.257493] RIP: 0033:0x7fb362bacb19 [ 2067.257908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2067.259937] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2067.260786] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2067.261597] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2067.262384] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2067.263173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2067.263962] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 03:59:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 11) 03:59:42 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:42 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227d, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:42 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x3}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:59:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x48, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:59:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xf000000}, 0x0) 03:59:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2202, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:59:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 12) [ 2067.294111] FAULT_INJECTION: forcing a failure. [ 2067.294111] name failslab, interval 1, probability 0, space 0, times 0 [ 2067.295375] CPU: 1 PID: 11337 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2067.296123] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2067.297039] Call Trace: [ 2067.297337] dump_stack+0x107/0x167 [ 2067.297730] should_fail.cold+0x5/0xa [ 2067.298138] ? crypto_create_tfm_node+0x84/0x340 [ 2067.298649] should_failslab+0x5/0x20 [ 2067.299054] __kmalloc_node+0x76/0x420 [ 2067.299475] crypto_create_tfm_node+0x84/0x340 [ 2067.299963] crypto_alloc_tfm_node+0x108/0x270 [ 2067.300457] esp_init_aead+0xf6/0x2f0 [ 2067.300863] ? esp6_destroy+0x60/0x60 [ 2067.301290] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2067.301780] ? static_obj+0x40/0xc0 [ 2067.302176] ? __xfrm_init_state+0x6ca/0x1490 [ 2067.302644] ? lock_downgrade+0x6d0/0x6d0 [ 2067.303094] esp6_init_state+0x7a/0x420 [ 2067.303517] __xfrm_init_state+0x778/0x1490 [ 2067.303993] xfrm_add_sa+0x1ec5/0x3510 [ 2067.304418] ? xfrm_send_acquire+0xa50/0xa50 [ 2067.304887] ? security_capable+0x95/0xc0 [ 2067.305371] ? __nla_parse+0x3e/0x50 [ 2067.305774] ? xfrm_send_acquire+0xa50/0xa50 [ 2067.306257] xfrm_user_rcv_msg+0x416/0x830 [ 2067.306722] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2067.307306] ? __mutex_lock+0x4fe/0x10b0 [ 2067.307750] ? __lockdep_reset_lock+0x180/0x180 [ 2067.308276] netlink_rcv_skb+0x14b/0x430 [ 2067.308715] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2067.309263] ? netlink_ack+0xab0/0xab0 [ 2067.309686] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2067.310186] xfrm_netlink_rcv+0x6b/0x90 [ 2067.310621] netlink_unicast+0x549/0x7f0 [ 2067.311070] ? netlink_attachskb+0x870/0x870 [ 2067.311536] ? __virt_addr_valid+0x128/0x350 [ 2067.312019] netlink_sendmsg+0x90f/0xdf0 [ 2067.312460] ? netlink_unicast+0x7f0/0x7f0 [ 2067.312926] ? netlink_unicast+0x7f0/0x7f0 [ 2067.313386] sock_sendmsg+0x154/0x190 [ 2067.313806] ____sys_sendmsg+0x70d/0x870 [ 2067.314242] ? kernel_sendmsg+0x50/0x50 [ 2067.314667] ? do_recvmmsg+0x6d0/0x6d0 [ 2067.315082] ? perf_trace_lock+0xac/0x490 [ 2067.315530] ? __lockdep_reset_lock+0x180/0x180 [ 2067.316025] ? perf_trace_lock+0xac/0x490 [ 2067.316478] ___sys_sendmsg+0xf3/0x170 [ 2067.316910] ? sendmsg_copy_msghdr+0x160/0x160 [ 2067.317407] ? lock_downgrade+0x6d0/0x6d0 [ 2067.317851] ? find_held_lock+0x2c/0x110 [ 2067.318295] ? __fget_files+0x296/0x4c0 [ 2067.318737] ? __fget_light+0xea/0x290 [ 2067.319167] __sys_sendmsg+0xe5/0x1b0 [ 2067.319571] ? __sys_sendmsg_sock+0x40/0x40 [ 2067.320035] ? rcu_read_lock_any_held+0x75/0xa0 [ 2067.320544] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2067.321137] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2067.321689] ? trace_hardirqs_on+0x5b/0x180 [ 2067.322159] do_syscall_64+0x33/0x40 [ 2067.322557] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2067.323106] RIP: 0033:0x7fb362bacb19 [ 2067.323502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2067.325533] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2067.326348] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2067.327121] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2067.327892] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2067.328667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2067.329466] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2067.330699] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:59:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x20000000}, 0x0) 03:59:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 13) [ 2067.369348] FAULT_INJECTION: forcing a failure. [ 2067.369348] name failslab, interval 1, probability 0, space 0, times 0 [ 2067.370632] CPU: 1 PID: 11344 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2067.371361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2067.372235] Call Trace: [ 2067.372516] dump_stack+0x107/0x167 [ 2067.372915] should_fail.cold+0x5/0xa [ 2067.373323] ? create_object.isra.0+0x3a/0xa20 [ 2067.373804] should_failslab+0x5/0x20 [ 2067.374207] kmem_cache_alloc+0x5b/0x310 [ 2067.374645] create_object.isra.0+0x3a/0xa20 [ 2067.375117] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2067.375657] __kmalloc_node+0x1ae/0x420 [ 2067.376084] crypto_create_tfm_node+0x84/0x340 [ 2067.376568] crypto_alloc_tfm_node+0x108/0x270 [ 2067.377075] esp_init_aead+0xf6/0x2f0 [ 2067.377488] ? esp6_destroy+0x60/0x60 [ 2067.377892] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2067.378387] ? static_obj+0x40/0xc0 [ 2067.378777] ? __xfrm_init_state+0x6ca/0x1490 [ 2067.379262] ? lock_downgrade+0x6d0/0x6d0 [ 2067.379708] esp6_init_state+0x7a/0x420 [ 2067.380142] __xfrm_init_state+0x778/0x1490 [ 2067.380600] xfrm_add_sa+0x1ec5/0x3510 [ 2067.381022] ? xfrm_send_acquire+0xa50/0xa50 [ 2067.381483] ? security_capable+0x95/0xc0 [ 2067.381924] ? __nla_parse+0x3e/0x50 [ 2067.382321] ? xfrm_send_acquire+0xa50/0xa50 [ 2067.382798] xfrm_user_rcv_msg+0x416/0x830 [ 2067.383248] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2067.383807] ? __mutex_lock+0x4fe/0x10b0 [ 2067.384240] ? __lockdep_reset_lock+0x180/0x180 [ 2067.384742] netlink_rcv_skb+0x14b/0x430 [ 2067.385181] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2067.385718] ? netlink_ack+0xab0/0xab0 [ 2067.386137] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2067.386631] xfrm_netlink_rcv+0x6b/0x90 [ 2067.387052] netlink_unicast+0x549/0x7f0 [ 2067.387491] ? netlink_attachskb+0x870/0x870 [ 2067.387954] ? __virt_addr_valid+0x128/0x350 [ 2067.388433] netlink_sendmsg+0x90f/0xdf0 [ 2067.388866] ? netlink_unicast+0x7f0/0x7f0 [ 2067.389346] ? netlink_unicast+0x7f0/0x7f0 [ 2067.389812] sock_sendmsg+0x154/0x190 [ 2067.390221] ____sys_sendmsg+0x70d/0x870 [ 2067.390659] ? kernel_sendmsg+0x50/0x50 [ 2067.391084] ? do_recvmmsg+0x6d0/0x6d0 [ 2067.391501] ? perf_trace_lock+0xac/0x490 [ 2067.391950] ? __lockdep_reset_lock+0x180/0x180 [ 2067.392445] ? perf_trace_lock+0xac/0x490 [ 2067.392902] ___sys_sendmsg+0xf3/0x170 [ 2067.393318] ? sendmsg_copy_msghdr+0x160/0x160 [ 2067.393805] ? lock_downgrade+0x6d0/0x6d0 [ 2067.394251] ? find_held_lock+0x2c/0x110 [ 2067.394700] ? __fget_files+0x296/0x4c0 [ 2067.395130] ? __fget_light+0xea/0x290 [ 2067.395551] __sys_sendmsg+0xe5/0x1b0 [ 2067.395954] ? __sys_sendmsg_sock+0x40/0x40 [ 2067.396413] ? rcu_read_lock_any_held+0x75/0xa0 [ 2067.396923] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2067.397487] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2067.398033] ? trace_hardirqs_on+0x5b/0x180 [ 2067.398498] do_syscall_64+0x33/0x40 [ 2067.398891] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2067.399442] RIP: 0033:0x7fb362bacb19 [ 2067.399842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2067.401841] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2067.402648] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2067.403411] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2067.404180] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2067.404949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2067.405716] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 03:59:42 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227e, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:59:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2067.678264] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:59:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x4c, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:59:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x2a010000}, 0x0) 03:59:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xe61c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:59:57 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:57 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x227f, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 14) 03:59:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2203, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:59:57 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x4}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2082.699780] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2082.720652] FAULT_INJECTION: forcing a failure. [ 2082.720652] name failslab, interval 1, probability 0, space 0, times 0 [ 2082.723108] CPU: 0 PID: 11376 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2082.724506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2082.726215] Call Trace: [ 2082.726766] dump_stack+0x107/0x167 [ 2082.727504] should_fail.cold+0x5/0xa [ 2082.728281] ? crypto_create_tfm_node+0x84/0x340 [ 2082.729252] should_failslab+0x5/0x20 [ 2082.730022] __kmalloc_node+0x76/0x420 [ 2082.730826] crypto_create_tfm_node+0x84/0x340 [ 2082.731758] crypto_spawn_tfm2+0x60/0xc0 [ 2082.732578] aead_init_geniv+0x1c3/0x330 [ 2082.733392] ? kasan_unpoison_shadow+0x33/0x50 [ 2082.734320] ? aead_geniv_free+0x20/0x20 [ 2082.735150] crypto_aead_init_tfm+0x13b/0x1a0 [ 2082.736041] crypto_create_tfm_node+0x117/0x340 [ 2082.736973] crypto_alloc_tfm_node+0x108/0x270 [ 2082.737917] esp_init_aead+0xf6/0x2f0 [ 2082.738700] ? esp6_destroy+0x60/0x60 [ 2082.739457] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2082.740409] ? static_obj+0x40/0xc0 [ 2082.741147] ? __xfrm_init_state+0x6ca/0x1490 [ 2082.742040] ? lock_downgrade+0x6d0/0x6d0 [ 2082.742884] esp6_init_state+0x7a/0x420 [ 2082.743689] __xfrm_init_state+0x778/0x1490 [ 2082.744555] xfrm_add_sa+0x1ec5/0x3510 [ 2082.745348] ? xfrm_send_acquire+0xa50/0xa50 [ 2082.746238] ? security_capable+0x95/0xc0 [ 2082.747095] ? __nla_parse+0x3e/0x50 [ 2082.747861] ? xfrm_send_acquire+0xa50/0xa50 [ 2082.748763] xfrm_user_rcv_msg+0x416/0x830 [ 2082.749650] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2082.750739] ? __mutex_lock+0x4fe/0x10b0 [ 2082.751571] ? __lockdep_reset_lock+0x180/0x180 [ 2082.752529] netlink_rcv_skb+0x14b/0x430 [ 2082.753372] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2082.754416] ? netlink_ack+0xab0/0xab0 [ 2082.755231] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2082.756167] xfrm_netlink_rcv+0x6b/0x90 [ 2082.756966] netlink_unicast+0x549/0x7f0 [ 2082.757820] ? netlink_attachskb+0x870/0x870 [ 2082.758733] ? __virt_addr_valid+0x128/0x350 [ 2082.759675] netlink_sendmsg+0x90f/0xdf0 [ 2082.760521] ? netlink_unicast+0x7f0/0x7f0 [ 2082.761441] ? netlink_unicast+0x7f0/0x7f0 [ 2082.762317] sock_sendmsg+0x154/0x190 [ 2082.763100] ____sys_sendmsg+0x70d/0x870 [ 2082.763952] ? kernel_sendmsg+0x50/0x50 [ 2082.764762] ? do_recvmmsg+0x6d0/0x6d0 [ 2082.765583] ? perf_trace_lock+0xac/0x490 [ 2082.766449] ? __lockdep_reset_lock+0x180/0x180 [ 2082.767405] ? perf_trace_lock+0xac/0x490 [ 2082.768261] ___sys_sendmsg+0xf3/0x170 [ 2082.769062] ? sendmsg_copy_msghdr+0x160/0x160 [ 2082.770018] ? lock_downgrade+0x6d0/0x6d0 [ 2082.770875] ? find_held_lock+0x2c/0x110 [ 2082.771725] ? __fget_files+0x296/0x4c0 [ 2082.772550] ? __fget_light+0xea/0x290 [ 2082.773384] __sys_sendmsg+0xe5/0x1b0 [ 2082.774168] ? __sys_sendmsg_sock+0x40/0x40 [ 2082.775053] ? rcu_read_lock_any_held+0x75/0xa0 [ 2082.776023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2082.777109] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2082.778171] ? trace_hardirqs_on+0x5b/0x180 [ 2082.779062] do_syscall_64+0x33/0x40 [ 2082.779828] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2082.780884] RIP: 0033:0x7fb362bacb19 [ 2082.781657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2082.785463] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2082.787022] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2082.788478] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2082.789955] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2082.791434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2082.792898] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 03:59:57 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2282, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2082.809159] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:59:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x40000000}, 0x0) 03:59:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:59:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 03:59:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 15) 03:59:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2205, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:59:57 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2283, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x45030000}, 0x0) [ 2083.117195] FAULT_INJECTION: forcing a failure. [ 2083.117195] name failslab, interval 1, probability 0, space 0, times 0 [ 2083.119673] CPU: 1 PID: 11402 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2083.121077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2083.122752] Call Trace: [ 2083.123289] dump_stack+0x107/0x167 [ 2083.124028] should_fail.cold+0x5/0xa [ 2083.124811] ? create_object.isra.0+0x3a/0xa20 [ 2083.125763] should_failslab+0x5/0x20 [ 2083.126532] kmem_cache_alloc+0x5b/0x310 [ 2083.127355] create_object.isra.0+0x3a/0xa20 [ 2083.128279] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2083.129320] __kmalloc_node+0x1ae/0x420 [ 2083.130133] crypto_create_tfm_node+0x84/0x340 [ 2083.131093] crypto_spawn_tfm2+0x60/0xc0 [ 2083.131937] aead_init_geniv+0x1c3/0x330 [ 2083.132761] ? kasan_unpoison_shadow+0x33/0x50 [ 2083.133716] ? aead_geniv_free+0x20/0x20 [ 2083.134547] crypto_aead_init_tfm+0x13b/0x1a0 [ 2083.135488] crypto_create_tfm_node+0x117/0x340 [ 2083.136442] crypto_alloc_tfm_node+0x108/0x270 [ 2083.137390] esp_init_aead+0xf6/0x2f0 [ 2083.138179] ? esp6_destroy+0x60/0x60 [ 2083.138972] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2083.139917] ? static_obj+0x40/0xc0 [ 2083.140685] ? __xfrm_init_state+0x6ca/0x1490 [ 2083.141617] ? lock_downgrade+0x6d0/0x6d0 [ 2083.142487] esp6_init_state+0x7a/0x420 [ 2083.143322] __xfrm_init_state+0x778/0x1490 [ 2083.144217] xfrm_add_sa+0x1ec5/0x3510 [ 2083.145010] ? xfrm_send_acquire+0xa50/0xa50 [ 2083.145914] ? security_capable+0x95/0xc0 [ 2083.146770] ? __nla_parse+0x3e/0x50 [ 2083.147535] ? xfrm_send_acquire+0xa50/0xa50 [ 2083.148423] xfrm_user_rcv_msg+0x416/0x830 [ 2083.149287] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2083.150360] ? __mutex_lock+0x4fe/0x10b0 [ 2083.151197] ? __lockdep_reset_lock+0x180/0x180 [ 2083.152148] netlink_rcv_skb+0x14b/0x430 [ 2083.152972] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2083.154013] ? netlink_ack+0xab0/0xab0 [ 2083.154808] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2083.155764] xfrm_netlink_rcv+0x6b/0x90 [ 2083.156581] netlink_unicast+0x549/0x7f0 [ 2083.157426] ? netlink_attachskb+0x870/0x870 [ 2083.158314] ? __virt_addr_valid+0x128/0x350 [ 2083.159235] netlink_sendmsg+0x90f/0xdf0 [ 2083.160074] ? netlink_unicast+0x7f0/0x7f0 [ 2083.160951] ? netlink_unicast+0x7f0/0x7f0 [ 2083.161807] sock_sendmsg+0x154/0x190 [ 2083.162578] ____sys_sendmsg+0x70d/0x870 [ 2083.163427] ? kernel_sendmsg+0x50/0x50 [ 2083.164238] ? do_recvmmsg+0x6d0/0x6d0 [ 2083.165026] ? perf_trace_lock+0xac/0x490 [ 2083.165887] ? __lockdep_reset_lock+0x180/0x180 [ 2083.166839] ? perf_trace_lock+0xac/0x490 [ 2083.167678] ___sys_sendmsg+0xf3/0x170 [ 2083.168467] ? sendmsg_copy_msghdr+0x160/0x160 [ 2083.169406] ? lock_downgrade+0x6d0/0x6d0 [ 2083.170242] ? find_held_lock+0x2c/0x110 [ 2083.171084] ? __fget_files+0x296/0x4c0 [ 2083.171909] ? __fget_light+0xea/0x290 [ 2083.172719] __sys_sendmsg+0xe5/0x1b0 [ 2083.173516] ? __sys_sendmsg_sock+0x40/0x40 [ 2083.174390] ? rcu_read_lock_any_held+0x75/0xa0 [ 2083.175341] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2083.176394] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2083.177447] ? trace_hardirqs_on+0x5b/0x180 [ 2083.178330] do_syscall_64+0x33/0x40 [ 2083.179084] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2083.180115] RIP: 0033:0x7fb362bacb19 [ 2083.180862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2083.184569] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2083.186132] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2083.187563] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2083.189000] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2083.190441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2083.191875] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2083.222543] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 03:59:58 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x68, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:59:58 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:58 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x5}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x9effffff}, 0x0) 03:59:58 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2284, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2270, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 03:59:58 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 03:59:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 16) [ 2083.425239] FAULT_INJECTION: forcing a failure. [ 2083.425239] name failslab, interval 1, probability 0, space 0, times 0 [ 2083.427801] CPU: 0 PID: 11435 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2083.429249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2083.430940] Call Trace: [ 2083.431486] dump_stack+0x107/0x167 [ 2083.432242] should_fail.cold+0x5/0xa [ 2083.433024] ? crypto_create_tfm_node+0x84/0x340 [ 2083.434010] should_failslab+0x5/0x20 [ 2083.434798] __kmalloc_node+0x76/0x420 [ 2083.435616] crypto_create_tfm_node+0x84/0x340 [ 2083.436563] crypto_spawn_tfm2+0x60/0xc0 [ 2083.437416] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2083.438426] crypto_rfc4106_init_tfm+0x3d/0x1b0 [ 2083.439379] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2083.440408] crypto_aead_init_tfm+0x13b/0x1a0 [ 2083.441348] crypto_create_tfm_node+0x117/0x340 [ 2083.442310] crypto_spawn_tfm2+0x60/0xc0 [ 2083.443145] aead_init_geniv+0x1c3/0x330 [ 2083.443980] ? kasan_unpoison_shadow+0x33/0x50 [ 2083.444923] ? aead_geniv_free+0x20/0x20 [ 2083.445767] crypto_aead_init_tfm+0x13b/0x1a0 [ 2083.446694] crypto_create_tfm_node+0x117/0x340 [ 2083.447653] crypto_alloc_tfm_node+0x108/0x270 [ 2083.448606] esp_init_aead+0xf6/0x2f0 [ 2083.449411] ? esp6_destroy+0x60/0x60 [ 2083.450198] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2083.451161] ? static_obj+0x40/0xc0 [ 2083.451918] ? __xfrm_init_state+0x6ca/0x1490 [ 2083.452837] ? lock_downgrade+0x6d0/0x6d0 [ 2083.453711] esp6_init_state+0x7a/0x420 [ 2083.454536] __xfrm_init_state+0x778/0x1490 [ 2083.455435] xfrm_add_sa+0x1ec5/0x3510 [ 2083.456240] ? xfrm_send_acquire+0xa50/0xa50 [ 2083.457155] ? security_capable+0x95/0xc0 [ 2083.458015] ? __nla_parse+0x3e/0x50 [ 2083.458790] ? xfrm_send_acquire+0xa50/0xa50 [ 2083.459704] xfrm_user_rcv_msg+0x416/0x830 [ 2083.460599] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2083.461709] ? __mutex_lock+0x4fe/0x10b0 [ 2083.462555] ? __lockdep_reset_lock+0x180/0x180 [ 2083.463529] netlink_rcv_skb+0x14b/0x430 [ 2083.464378] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2083.465414] ? netlink_ack+0xab0/0xab0 [ 2083.466234] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2083.467176] xfrm_netlink_rcv+0x6b/0x90 [ 2083.467991] netlink_unicast+0x549/0x7f0 [ 2083.468828] ? netlink_attachskb+0x870/0x870 [ 2083.469741] ? __virt_addr_valid+0x128/0x350 [ 2083.470664] netlink_sendmsg+0x90f/0xdf0 [ 2083.471515] ? netlink_unicast+0x7f0/0x7f0 [ 2083.472389] ? netlink_unicast+0x7f0/0x7f0 [ 2083.473261] sock_sendmsg+0x154/0x190 [ 2083.474045] ____sys_sendmsg+0x70d/0x870 [ 2083.474876] ? kernel_sendmsg+0x50/0x50 [ 2083.475684] ? do_recvmmsg+0x6d0/0x6d0 [ 2083.476482] ? perf_trace_lock+0xac/0x490 [ 2083.477345] ? __lockdep_reset_lock+0x180/0x180 [ 2083.478293] ? perf_trace_lock+0xac/0x490 [ 2083.479152] ___sys_sendmsg+0xf3/0x170 [ 2083.479948] ? sendmsg_copy_msghdr+0x160/0x160 [ 2083.480884] ? lock_downgrade+0x6d0/0x6d0 [ 2083.481752] ? find_held_lock+0x2c/0x110 [ 2083.482611] ? __fget_files+0x296/0x4c0 [ 2083.483444] ? __fget_light+0xea/0x290 [ 2083.484254] __sys_sendmsg+0xe5/0x1b0 [ 2083.485031] ? __sys_sendmsg_sock+0x40/0x40 [ 2083.485923] ? rcu_read_lock_any_held+0x75/0xa0 [ 2083.486905] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2083.487988] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2083.489054] ? trace_hardirqs_on+0x5b/0x180 [ 2083.489959] do_syscall_64+0x33/0x40 [ 2083.490733] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2083.491785] RIP: 0033:0x7fb362bacb19 [ 2083.492565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2083.496366] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2083.497929] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2083.499410] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2083.500866] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2083.502338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2083.503773] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2095.190778] FAULT_INJECTION: forcing a failure. [ 2095.190778] name failslab, interval 1, probability 0, space 0, times 0 [ 2095.193305] CPU: 1 PID: 11447 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2095.194808] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2095.196603] Call Trace: [ 2095.197180] dump_stack+0x107/0x167 [ 2095.197991] should_fail.cold+0x5/0xa 04:00:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:00:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x6c, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:00:09 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x6}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 17) 04:00:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xe4010000}, 0x0) 04:00:09 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2285, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2271, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:00:09 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2095.199035] ? create_object.isra.0+0x3a/0xa20 [ 2095.200103] should_failslab+0x5/0x20 [ 2095.200938] kmem_cache_alloc+0x5b/0x310 [ 2095.201851] create_object.isra.0+0x3a/0xa20 [ 2095.202804] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2095.203928] __kmalloc_node+0x1ae/0x420 [ 2095.204801] crypto_create_tfm_node+0x84/0x340 [ 2095.205822] crypto_spawn_tfm2+0x60/0xc0 [ 2095.206702] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2095.207810] crypto_rfc4106_init_tfm+0x3d/0x1b0 [ 2095.208814] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2095.209911] crypto_aead_init_tfm+0x13b/0x1a0 [ 2095.210876] crypto_create_tfm_node+0x117/0x340 [ 2095.211918] crypto_spawn_tfm2+0x60/0xc0 [ 2095.212797] aead_init_geniv+0x1c3/0x330 [ 2095.213701] ? kasan_unpoison_shadow+0x33/0x50 [ 2095.214699] ? aead_geniv_free+0x20/0x20 [ 2095.215591] crypto_aead_init_tfm+0x13b/0x1a0 [ 2095.216594] crypto_create_tfm_node+0x117/0x340 [ 2095.217626] crypto_alloc_tfm_node+0x108/0x270 [ 2095.218652] esp_init_aead+0xf6/0x2f0 [ 2095.219485] ? esp6_destroy+0x60/0x60 [ 2095.220339] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2095.221371] ? static_obj+0x40/0xc0 [ 2095.222187] ? __xfrm_init_state+0x6ca/0x1490 [ 2095.223160] ? lock_downgrade+0x6d0/0x6d0 [ 2095.224098] esp6_init_state+0x7a/0x420 [ 2095.224970] __xfrm_init_state+0x778/0x1490 [ 2095.225966] xfrm_add_sa+0x1ec5/0x3510 [ 2095.226825] ? xfrm_send_acquire+0xa50/0xa50 [ 2095.227813] ? security_capable+0x95/0xc0 [ 2095.228721] ? __nla_parse+0x3e/0x50 [ 2095.229575] ? xfrm_send_acquire+0xa50/0xa50 [ 2095.230535] xfrm_user_rcv_msg+0x416/0x830 [ 2095.231483] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2095.232625] ? __mutex_lock+0x4fe/0x10b0 [ 2095.233525] ? __lockdep_reset_lock+0x180/0x180 [ 2095.234544] netlink_rcv_skb+0x14b/0x430 [ 2095.235449] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2095.236543] ? netlink_ack+0xab0/0xab0 [ 2095.237441] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2095.238450] xfrm_netlink_rcv+0x6b/0x90 [ 2095.239326] netlink_unicast+0x549/0x7f0 [ 2095.240220] ? netlink_attachskb+0x870/0x870 [ 2095.241218] ? __virt_addr_valid+0x128/0x350 [ 2095.242211] netlink_sendmsg+0x90f/0xdf0 [ 2095.243141] ? netlink_unicast+0x7f0/0x7f0 [ 2095.244076] ? netlink_unicast+0x7f0/0x7f0 [ 2095.245038] sock_sendmsg+0x154/0x190 [ 2095.245878] ____sys_sendmsg+0x70d/0x870 [ 2095.246770] ? kernel_sendmsg+0x50/0x50 [ 2095.247630] ? do_recvmmsg+0x6d0/0x6d0 [ 2095.248483] ? perf_trace_lock+0xac/0x490 [ 2095.249402] ? __lockdep_reset_lock+0x180/0x180 [ 2095.250408] ? perf_trace_lock+0xac/0x490 [ 2095.251318] ___sys_sendmsg+0xf3/0x170 [ 2095.252187] ? sendmsg_copy_msghdr+0x160/0x160 [ 2095.253185] ? lock_downgrade+0x6d0/0x6d0 [ 2095.254119] ? find_held_lock+0x2c/0x110 [ 2095.255011] ? __fget_files+0x296/0x4c0 [ 2095.255930] ? __fget_light+0xea/0x290 [ 2095.256808] __sys_sendmsg+0xe5/0x1b0 [ 2095.257668] ? __sys_sendmsg_sock+0x40/0x40 [ 2095.258616] ? rcu_read_lock_any_held+0x75/0xa0 [ 2095.259680] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2095.260836] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2095.261991] ? trace_hardirqs_on+0x5b/0x180 [ 2095.262959] do_syscall_64+0x33/0x40 [ 2095.263779] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2095.264917] RIP: 0033:0x7fb362bacb19 [ 2095.265752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2095.269746] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2095.271453] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2095.273003] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2095.274570] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2095.276122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2095.277683] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 04:00:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xf0ffffff}, 0x0) [ 2095.312102] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:00:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xfeffffff}, 0x0) [ 2095.362762] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:00:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 18) 04:00:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xfffff000}, 0x0) 04:00:24 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:24 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x74, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:00:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2272, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:00:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:00:24 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2286, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2110.232021] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2110.240795] FAULT_INJECTION: forcing a failure. [ 2110.240795] name failslab, interval 1, probability 0, space 0, times 0 [ 2110.242507] CPU: 1 PID: 11497 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2110.243517] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2110.244735] Call Trace: [ 2110.245124] dump_stack+0x107/0x167 [ 2110.245662] should_fail.cold+0x5/0xa [ 2110.246221] ? crypto_create_tfm_node+0x84/0x340 [ 2110.246935] should_failslab+0x5/0x20 [ 2110.247483] __kmalloc_node+0x76/0x420 [ 2110.248066] crypto_create_tfm_node+0x84/0x340 [ 2110.248745] crypto_spawn_tfm2+0x60/0xc0 [ 2110.249338] crypto_gcm_init_tfm+0x3d/0x260 [ 2110.249987] ? crypto_rfc4106_init_tfm+0x1b0/0x1b0 [ 2110.250722] crypto_aead_init_tfm+0x13b/0x1a0 [ 2110.251391] crypto_create_tfm_node+0x117/0x340 [ 2110.252085] crypto_spawn_tfm2+0x60/0xc0 [ 2110.252689] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2110.253442] crypto_rfc4106_init_tfm+0x3d/0x1b0 [ 2110.254141] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2110.254882] crypto_aead_init_tfm+0x13b/0x1a0 [ 2110.255556] crypto_create_tfm_node+0x117/0x340 [ 2110.256249] crypto_spawn_tfm2+0x60/0xc0 [ 2110.256854] aead_init_geniv+0x1c3/0x330 [ 2110.257460] ? kasan_unpoison_shadow+0x33/0x50 [ 2110.258132] ? aead_geniv_free+0x20/0x20 [ 2110.258737] crypto_aead_init_tfm+0x13b/0x1a0 [ 2110.259405] crypto_create_tfm_node+0x117/0x340 [ 2110.260099] crypto_alloc_tfm_node+0x108/0x270 [ 2110.260776] esp_init_aead+0xf6/0x2f0 [ 2110.261340] ? esp6_destroy+0x60/0x60 [ 2110.261916] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2110.262601] ? static_obj+0x40/0xc0 [ 2110.263143] ? __xfrm_init_state+0x6ca/0x1490 [ 2110.263802] ? lock_downgrade+0x6d0/0x6d0 [ 2110.264424] esp6_init_state+0x7a/0x420 [ 2110.265012] __xfrm_init_state+0x778/0x1490 [ 2110.265683] xfrm_add_sa+0x1ec5/0x3510 [ 2110.266274] ? xfrm_send_acquire+0xa50/0xa50 [ 2110.266920] ? security_capable+0x95/0xc0 [ 2110.267534] ? __nla_parse+0x3e/0x50 [ 2110.268091] ? xfrm_send_acquire+0xa50/0xa50 [ 2110.268750] xfrm_user_rcv_msg+0x416/0x830 [ 2110.269378] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2110.270153] ? __mutex_lock+0x4fe/0x10b0 [ 2110.270753] ? __lockdep_reset_lock+0x180/0x180 [ 2110.271438] netlink_rcv_skb+0x14b/0x430 [ 2110.272032] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2110.272761] ? netlink_ack+0xab0/0xab0 [ 2110.273340] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2110.274030] xfrm_netlink_rcv+0x6b/0x90 [ 2110.274611] netlink_unicast+0x549/0x7f0 [ 2110.275210] ? netlink_attachskb+0x870/0x870 [ 2110.275850] ? __virt_addr_valid+0x128/0x350 [ 2110.276500] netlink_sendmsg+0x90f/0xdf0 [ 2110.277098] ? netlink_unicast+0x7f0/0x7f0 [ 2110.277746] ? netlink_unicast+0x7f0/0x7f0 [ 2110.278362] sock_sendmsg+0x154/0x190 [ 2110.278917] ____sys_sendmsg+0x70d/0x870 [ 2110.279520] ? kernel_sendmsg+0x50/0x50 [ 2110.280104] ? do_recvmmsg+0x6d0/0x6d0 [ 2110.280672] ? perf_trace_lock+0xac/0x490 [ 2110.281280] ? __lockdep_reset_lock+0x180/0x180 [ 2110.281970] ? perf_trace_lock+0xac/0x490 [ 2110.282579] ___sys_sendmsg+0xf3/0x170 [ 2110.283148] ? sendmsg_copy_msghdr+0x160/0x160 [ 2110.283819] ? lock_downgrade+0x6d0/0x6d0 [ 2110.284424] ? find_held_lock+0x2c/0x110 [ 2110.285019] ? __fget_files+0x296/0x4c0 [ 2110.285612] ? __fget_light+0xea/0x290 [ 2110.286193] __sys_sendmsg+0xe5/0x1b0 [ 2110.286746] ? __sys_sendmsg_sock+0x40/0x40 [ 2110.287373] ? rcu_read_lock_any_held+0x75/0xa0 [ 2110.288065] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2110.288831] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2110.289595] ? trace_hardirqs_on+0x5b/0x180 [ 2110.290222] do_syscall_64+0x33/0x40 [ 2110.290769] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2110.291511] RIP: 0033:0x7fb362bacb19 [ 2110.292053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2110.294732] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2110.295844] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2110.296878] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2110.297925] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2110.298953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2110.299984] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 04:00:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xffffff7f}, 0x0) [ 2110.341582] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:00:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 19) 04:00:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2275, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:00:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:00:25 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2287, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:25 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x300}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xffffff9e}, 0x0) 04:00:25 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2110.532470] FAULT_INJECTION: forcing a failure. [ 2110.532470] name failslab, interval 1, probability 0, space 0, times 0 [ 2110.535077] CPU: 0 PID: 11514 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2110.536632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2110.538526] Call Trace: [ 2110.539134] dump_stack+0x107/0x167 [ 2110.539964] should_fail.cold+0x5/0xa [ 2110.540849] ? create_object.isra.0+0x3a/0xa20 [ 2110.541924] should_failslab+0x5/0x20 [ 2110.542803] kmem_cache_alloc+0x5b/0x310 [ 2110.543725] create_object.isra.0+0x3a/0xa20 [ 2110.544692] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2110.545835] __kmalloc_node+0x1ae/0x420 [ 2110.546720] crypto_create_tfm_node+0x84/0x340 [ 2110.547732] crypto_spawn_tfm2+0x60/0xc0 [ 2110.548640] crypto_gcm_init_tfm+0x3d/0x260 [ 2110.549642] ? crypto_rfc4106_init_tfm+0x1b0/0x1b0 [ 2110.550734] crypto_aead_init_tfm+0x13b/0x1a0 [ 2110.551732] crypto_create_tfm_node+0x117/0x340 [ 2110.552765] crypto_spawn_tfm2+0x60/0xc0 [ 2110.553679] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2110.554767] crypto_rfc4106_init_tfm+0x3d/0x1b0 [ 2110.555801] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2110.556881] crypto_aead_init_tfm+0x13b/0x1a0 [ 2110.557892] crypto_create_tfm_node+0x117/0x340 [ 2110.558917] crypto_spawn_tfm2+0x60/0xc0 [ 2110.559797] aead_init_geniv+0x1c3/0x330 [ 2110.560686] ? kasan_unpoison_shadow+0x33/0x50 [ 2110.561705] ? aead_geniv_free+0x20/0x20 [ 2110.562595] crypto_aead_init_tfm+0x13b/0x1a0 [ 2110.563578] crypto_create_tfm_node+0x117/0x340 [ 2110.564597] crypto_alloc_tfm_node+0x108/0x270 [ 2110.565616] esp_init_aead+0xf6/0x2f0 [ 2110.566453] ? esp6_destroy+0x60/0x60 [ 2110.567288] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2110.568307] ? static_obj+0x40/0xc0 [ 2110.569116] ? __xfrm_init_state+0x6ca/0x1490 [ 2110.570103] ? lock_downgrade+0x6d0/0x6d0 [ 2110.571024] esp6_init_state+0x7a/0x420 [ 2110.571898] __xfrm_init_state+0x778/0x1490 [ 2110.572847] xfrm_add_sa+0x1ec5/0x3510 [ 2110.573725] ? xfrm_send_acquire+0xa50/0xa50 [ 2110.574683] ? security_capable+0x95/0xc0 [ 2110.575586] ? __nla_parse+0x3e/0x50 [ 2110.576401] ? xfrm_send_acquire+0xa50/0xa50 [ 2110.577359] xfrm_user_rcv_msg+0x416/0x830 [ 2110.578300] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2110.579444] ? __mutex_lock+0x4fe/0x10b0 [ 2110.580328] ? __lockdep_reset_lock+0x180/0x180 [ 2110.581343] netlink_rcv_skb+0x14b/0x430 [ 2110.582241] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2110.583326] ? netlink_ack+0xab0/0xab0 [ 2110.584188] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2110.585188] xfrm_netlink_rcv+0x6b/0x90 [ 2110.586056] netlink_unicast+0x549/0x7f0 [ 2110.586937] ? netlink_attachskb+0x870/0x870 [ 2110.587887] ? __virt_addr_valid+0x128/0x350 [ 2110.588848] netlink_sendmsg+0x90f/0xdf0 [ 2110.589746] ? netlink_unicast+0x7f0/0x7f0 [ 2110.590677] ? netlink_unicast+0x7f0/0x7f0 [ 2110.591592] sock_sendmsg+0x154/0x190 [ 2110.592415] ____sys_sendmsg+0x70d/0x870 [ 2110.593293] ? kernel_sendmsg+0x50/0x50 [ 2110.594156] ? do_recvmmsg+0x6d0/0x6d0 [ 2110.594994] ? perf_trace_lock+0xac/0x490 [ 2110.595897] ? __lockdep_reset_lock+0x180/0x180 [ 2110.596897] ? perf_trace_lock+0xac/0x490 [ 2110.597808] ? SOFTIRQ_verbose+0x10/0x10 [ 2110.598690] ___sys_sendmsg+0xf3/0x170 [ 2110.599530] ? sendmsg_copy_msghdr+0x160/0x160 [ 2110.600515] ? lock_downgrade+0x6d0/0x6d0 [ 2110.601406] ? find_held_lock+0x2c/0x110 [ 2110.602289] ? __fget_files+0x296/0x4c0 [ 2110.603154] ? __fget_light+0xea/0x290 [ 2110.603998] __sys_sendmsg+0xe5/0x1b0 [ 2110.604816] ? __sys_sendmsg_sock+0x40/0x40 [ 2110.605750] ? rcu_read_lock_any_held+0x75/0xa0 [ 2110.606765] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2110.607893] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2110.608992] ? trace_hardirqs_on+0x5b/0x180 [ 2110.609943] do_syscall_64+0x33/0x40 [ 2110.610743] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2110.611839] RIP: 0033:0x7fb362bacb19 [ 2110.612635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2110.616567] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2110.618205] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2110.619718] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2110.621229] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2110.622744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2110.624251] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 04:00:25 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2288, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xfffffff0}, 0x0) [ 2110.667278] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:00:25 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xfffffffe}, 0x0) 04:00:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xe0ffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:00:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2276, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:00:25 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x2289, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:00:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x7a, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2110.880742] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2110.900625] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:00:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 20) 04:00:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0xd1, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:00:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:00:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x8000000000000}, 0x0) 04:00:39 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x500}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2124.446058] FAULT_INJECTION: forcing a failure. [ 2124.446058] name failslab, interval 1, probability 0, space 0, times 0 [ 2124.447581] CPU: 1 PID: 11577 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2124.448481] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2124.449547] Call Trace: [ 2124.449909] dump_stack+0x107/0x167 [ 2124.450395] should_fail.cold+0x5/0xa [ 2124.450904] ? crypto_create_tfm_node+0x84/0x340 [ 2124.451536] should_failslab+0x5/0x20 [ 2124.452042] __kmalloc_node+0x76/0x420 [ 2124.452549] crypto_create_tfm_node+0x84/0x340 [ 2124.453142] crypto_init_shash_ops_async+0x59/0x3a0 [ 2124.453801] crypto_ahash_init_tfm+0x3f0/0x500 [ 2124.454391] crypto_create_tfm_node+0x117/0x340 [ 2124.454994] crypto_spawn_tfm2+0x60/0xc0 [ 2124.455521] crypto_gcm_init_tfm+0x3d/0x260 [ 2124.456078] ? crypto_rfc4106_init_tfm+0x1b0/0x1b0 [ 2124.456709] crypto_aead_init_tfm+0x13b/0x1a0 [ 2124.457288] crypto_create_tfm_node+0x117/0x340 [ 2124.457901] crypto_spawn_tfm2+0x60/0xc0 [ 2124.458365] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2124.458851] crypto_rfc4106_init_tfm+0x3d/0x1b0 [ 2124.459310] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2124.459794] crypto_aead_init_tfm+0x13b/0x1a0 [ 2124.460239] crypto_create_tfm_node+0x117/0x340 [ 2124.460701] crypto_spawn_tfm2+0x60/0xc0 [ 2124.461104] aead_init_geniv+0x1c3/0x330 [ 2124.461507] ? kasan_unpoison_shadow+0x33/0x50 [ 2124.461972] ? aead_geniv_free+0x20/0x20 [ 2124.462377] crypto_aead_init_tfm+0x13b/0x1a0 [ 2124.462826] crypto_create_tfm_node+0x117/0x340 [ 2124.463291] crypto_alloc_tfm_node+0x108/0x270 [ 2124.463749] esp_init_aead+0xf6/0x2f0 [ 2124.464127] ? esp6_destroy+0x60/0x60 [ 2124.464505] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2124.464967] ? static_obj+0x40/0xc0 [ 2124.465333] ? __xfrm_init_state+0x6ca/0x1490 [ 2124.465788] ? lock_downgrade+0x6d0/0x6d0 [ 2124.466204] esp6_init_state+0x7a/0x420 [ 2124.466609] __xfrm_init_state+0x778/0x1490 [ 2124.467056] xfrm_add_sa+0x1ec5/0x3510 [ 2124.467459] ? xfrm_send_acquire+0xa50/0xa50 [ 2124.467909] ? security_capable+0x95/0xc0 [ 2124.468337] ? __nla_parse+0x3e/0x50 [ 2124.468713] ? xfrm_send_acquire+0xa50/0xa50 [ 2124.469168] xfrm_user_rcv_msg+0x416/0x830 [ 2124.469611] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2124.470152] ? __mutex_lock+0x4fe/0x10b0 [ 2124.470564] ? __lockdep_reset_lock+0x180/0x180 [ 2124.471043] netlink_rcv_skb+0x14b/0x430 [ 2124.471458] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2124.471975] ? netlink_ack+0xab0/0xab0 [ 2124.472378] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2124.472850] xfrm_netlink_rcv+0x6b/0x90 [ 2124.473248] netlink_unicast+0x549/0x7f0 [ 2124.473678] ? netlink_attachskb+0x870/0x870 [ 2124.474128] ? __virt_addr_valid+0x128/0x350 [ 2124.474588] netlink_sendmsg+0x90f/0xdf0 [ 2124.475011] ? netlink_unicast+0x7f0/0x7f0 [ 2124.475445] ? netlink_unicast+0x7f0/0x7f0 [ 2124.475883] sock_sendmsg+0x154/0x190 [ 2124.476271] ____sys_sendmsg+0x70d/0x870 [ 2124.476689] ? kernel_sendmsg+0x50/0x50 [ 2124.477093] ? do_recvmmsg+0x6d0/0x6d0 [ 2124.477487] ? perf_trace_lock+0xac/0x490 [ 2124.477927] ? __lockdep_reset_lock+0x180/0x180 [ 2124.478404] ? perf_trace_lock+0xac/0x490 [ 2124.478836] ___sys_sendmsg+0xf3/0x170 [ 2124.479236] ? sendmsg_copy_msghdr+0x160/0x160 [ 2124.479703] ? lock_downgrade+0x6d0/0x6d0 [ 2124.480138] ? find_held_lock+0x2c/0x110 [ 2124.480561] ? __fget_files+0x296/0x4c0 [ 2124.480979] ? __fget_light+0xea/0x290 [ 2124.481374] __sys_sendmsg+0xe5/0x1b0 [ 2124.481777] ? __sys_sendmsg_sock+0x40/0x40 [ 2124.482219] ? rcu_read_lock_any_held+0x75/0xa0 [ 2124.482713] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2124.483256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2124.483791] ? trace_hardirqs_on+0x5b/0x180 [ 2124.484236] do_syscall_64+0x33/0x40 [ 2124.484623] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2124.485145] RIP: 0033:0x7fb362bacb19 [ 2124.485521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2124.487413] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2124.488184] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2124.488919] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2124.489654] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2124.490387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2124.491108] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 04:00:39 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4b47, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2279, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:00:39 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2124.503219] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2124.519253] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:00:39 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4b49, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x40030000000000}, 0x0) 04:00:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 21) 04:00:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2124.623877] FAULT_INJECTION: forcing a failure. [ 2124.623877] name failslab, interval 1, probability 0, space 0, times 0 [ 2124.626402] CPU: 0 PID: 11600 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2124.627887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2124.629662] Call Trace: [ 2124.630240] dump_stack+0x107/0x167 [ 2124.631037] should_fail.cold+0x5/0xa [ 2124.631855] ? create_object.isra.0+0x3a/0xa20 [ 2124.632820] should_failslab+0x5/0x20 [ 2124.633630] kmem_cache_alloc+0x5b/0x310 [ 2124.634498] create_object.isra.0+0x3a/0xa20 [ 2124.635437] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2124.636530] __kmalloc_node+0x1ae/0x420 [ 2124.637396] crypto_create_tfm_node+0x84/0x340 [ 2124.638392] crypto_init_shash_ops_async+0x59/0x3a0 [ 2124.639451] crypto_ahash_init_tfm+0x3f0/0x500 [ 2124.640423] crypto_create_tfm_node+0x117/0x340 [ 2124.641415] crypto_spawn_tfm2+0x60/0xc0 [ 2124.642285] crypto_gcm_init_tfm+0x3d/0x260 [ 2124.643221] ? crypto_rfc4106_init_tfm+0x1b0/0x1b0 [ 2124.644273] crypto_aead_init_tfm+0x13b/0x1a0 [ 2124.645235] crypto_create_tfm_node+0x117/0x340 [ 2124.646247] crypto_spawn_tfm2+0x60/0xc0 [ 2124.647115] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2124.648172] crypto_rfc4106_init_tfm+0x3d/0x1b0 [ 2124.649166] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2124.650240] crypto_aead_init_tfm+0x13b/0x1a0 [ 2124.651190] crypto_create_tfm_node+0x117/0x340 [ 2124.652188] crypto_spawn_tfm2+0x60/0xc0 [ 2124.653046] aead_init_geniv+0x1c3/0x330 [ 2124.653922] ? kasan_unpoison_shadow+0x33/0x50 [ 2124.654888] ? aead_geniv_free+0x20/0x20 [ 2124.655754] crypto_aead_init_tfm+0x13b/0x1a0 [ 2124.656709] crypto_create_tfm_node+0x117/0x340 [ 2124.657721] crypto_alloc_tfm_node+0x108/0x270 [ 2124.658701] esp_init_aead+0xf6/0x2f0 [ 2124.659513] ? esp6_destroy+0x60/0x60 [ 2124.660320] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2124.661316] ? static_obj+0x40/0xc0 [ 2124.662115] ? __xfrm_init_state+0x6ca/0x1490 [ 2124.663076] ? lock_downgrade+0x6d0/0x6d0 [ 2124.663974] esp6_init_state+0x7a/0x420 [ 2124.664832] __xfrm_init_state+0x778/0x1490 [ 2124.665777] xfrm_add_sa+0x1ec5/0x3510 [ 2124.666632] ? xfrm_send_acquire+0xa50/0xa50 [ 2124.667564] ? security_capable+0x95/0xc0 [ 2124.668445] ? __nla_parse+0x3e/0x50 [ 2124.669240] ? xfrm_send_acquire+0xa50/0xa50 [ 2124.670182] xfrm_user_rcv_msg+0x416/0x830 [ 2124.671077] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2124.672190] ? __mutex_lock+0x4fe/0x10b0 [ 2124.673045] ? __lockdep_reset_lock+0x180/0x180 [ 2124.674040] netlink_rcv_skb+0x14b/0x430 [ 2124.674897] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2124.675944] ? netlink_ack+0xab0/0xab0 [ 2124.676774] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2124.677757] xfrm_netlink_rcv+0x6b/0x90 [ 2124.678594] netlink_unicast+0x549/0x7f0 [ 2124.679454] ? netlink_attachskb+0x870/0x870 [ 2124.680372] ? __virt_addr_valid+0x128/0x350 [ 2124.681310] netlink_sendmsg+0x90f/0xdf0 [ 2124.682186] ? netlink_unicast+0x7f0/0x7f0 [ 2124.683093] ? netlink_unicast+0x7f0/0x7f0 [ 2124.683977] sock_sendmsg+0x154/0x190 [ 2124.684772] ____sys_sendmsg+0x70d/0x870 [ 2124.685633] ? kernel_sendmsg+0x50/0x50 [ 2124.686459] ? do_recvmmsg+0x6d0/0x6d0 [ 2124.687267] ? perf_trace_lock+0xac/0x490 [ 2124.688135] ? __lockdep_reset_lock+0x180/0x180 [ 2124.689095] ? perf_trace_lock+0xac/0x490 [ 2124.689961] ? SOFTIRQ_verbose+0x10/0x10 [ 2124.690806] ___sys_sendmsg+0xf3/0x170 [ 2124.691615] ? sendmsg_copy_msghdr+0x160/0x160 [ 2124.692574] ? lock_downgrade+0x6d0/0x6d0 [ 2124.693440] ? find_held_lock+0x2c/0x110 [ 2124.694297] ? __fget_files+0x296/0x4c0 [ 2124.695139] ? __fget_light+0xea/0x290 [ 2124.695963] __sys_sendmsg+0xe5/0x1b0 [ 2124.696754] ? __sys_sendmsg_sock+0x40/0x40 [ 2124.697657] ? rcu_read_lock_any_held+0x75/0xa0 [ 2124.698645] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2124.699720] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2124.700792] ? trace_hardirqs_on+0x5b/0x180 [ 2124.701688] do_syscall_64+0x33/0x40 [ 2124.702456] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2124.703495] RIP: 0033:0x7fb362bacb19 [ 2124.704263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2124.707981] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2124.709544] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2124.711015] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2124.712472] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2124.713943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2124.715401] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2124.722645] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:00:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0xff, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2137.522483] FAULT_INJECTION: forcing a failure. [ 2137.522483] name failslab, interval 1, probability 0, space 0, times 0 [ 2137.525456] CPU: 0 PID: 11611 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2137.527289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2137.529822] Call Trace: [ 2137.530534] dump_stack+0x107/0x167 [ 2137.531506] should_fail.cold+0x5/0xa [ 2137.532525] ? crypto_create_tfm_node+0x84/0x340 [ 2137.533920] should_failslab+0x5/0x20 [ 2137.535130] __kmalloc_node+0x76/0x420 [ 2137.536165] ? crypto_init_shash_ops_async+0x2d4/0x3a0 [ 2137.537568] crypto_create_tfm_node+0x84/0x340 [ 2137.538802] crypto_spawn_tfm2+0x60/0xc0 [ 2137.540110] crypto_gcm_init_tfm+0x6d/0x260 [ 2137.541242] ? crypto_rfc4106_init_tfm+0x1b0/0x1b0 [ 2137.542745] crypto_aead_init_tfm+0x13b/0x1a0 [ 2137.543949] crypto_create_tfm_node+0x117/0x340 [ 2137.545338] crypto_spawn_tfm2+0x60/0xc0 [ 2137.546432] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2137.547868] crypto_rfc4106_init_tfm+0x3d/0x1b0 [ 2137.549003] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2137.550452] crypto_aead_init_tfm+0x13b/0x1a0 [ 2137.551549] crypto_create_tfm_node+0x117/0x340 [ 2137.552906] crypto_spawn_tfm2+0x60/0xc0 [ 2137.553919] aead_init_geniv+0x1c3/0x330 [ 2137.555099] ? kasan_unpoison_shadow+0x33/0x50 [ 2137.556212] ? aead_geniv_free+0x20/0x20 [ 2137.557397] crypto_aead_init_tfm+0x13b/0x1a0 [ 2137.558456] crypto_create_tfm_node+0x117/0x340 [ 2137.559594] crypto_alloc_tfm_node+0x108/0x270 [ 2137.560623] esp_init_aead+0xf6/0x2f0 [ 2137.561407] ? esp6_destroy+0x60/0x60 [ 2137.562346] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2137.563300] ? static_obj+0x40/0xc0 [ 2137.564192] ? __xfrm_init_state+0x6ca/0x1490 [ 2137.565110] ? lock_downgrade+0x6d0/0x6d0 [ 2137.566031] esp6_init_state+0x7a/0x420 [ 2137.566835] __xfrm_init_state+0x778/0x1490 [ 2137.567714] xfrm_add_sa+0x1ec5/0x3510 [ 2137.568555] ? xfrm_send_acquire+0xa50/0xa50 [ 2137.569553] ? security_capable+0x95/0xc0 [ 2137.570507] ? __nla_parse+0x3e/0x50 [ 2137.571355] ? xfrm_send_acquire+0xa50/0xa50 [ 2137.572353] xfrm_user_rcv_msg+0x416/0x830 [ 2137.573317] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2137.574525] ? __mutex_lock+0x4fe/0x10b0 [ 2137.575450] ? __lockdep_reset_lock+0x180/0x180 [ 2137.576474] netlink_rcv_skb+0x14b/0x430 [ 2137.577291] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2137.578324] ? netlink_ack+0xab0/0xab0 [ 2137.579221] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2137.580261] xfrm_netlink_rcv+0x6b/0x90 [ 2137.581161] netlink_unicast+0x549/0x7f0 [ 2137.582099] ? netlink_attachskb+0x870/0x870 [ 2137.583091] ? __virt_addr_valid+0x128/0x350 [ 2137.584100] netlink_sendmsg+0x90f/0xdf0 [ 2137.585032] ? netlink_unicast+0x7f0/0x7f0 [ 2137.586022] ? netlink_unicast+0x7f0/0x7f0 [ 2137.586978] sock_sendmsg+0x154/0x190 [ 2137.587841] ____sys_sendmsg+0x70d/0x870 [ 2137.588763] ? kernel_sendmsg+0x50/0x50 [ 2137.589660] ? do_recvmmsg+0x6d0/0x6d0 [ 2137.590549] ? perf_trace_lock+0xac/0x490 [ 2137.591493] ? __lockdep_reset_lock+0x180/0x180 [ 2137.592541] ? perf_trace_lock+0xac/0x490 [ 2137.593485] ___sys_sendmsg+0xf3/0x170 [ 2137.594385] ? sendmsg_copy_msghdr+0x160/0x160 [ 2137.595429] ? lock_downgrade+0x6d0/0x6d0 [ 2137.596373] ? find_held_lock+0x2c/0x110 [ 2137.597308] ? __fget_files+0x296/0x4c0 [ 2137.598364] ? __fget_light+0xea/0x290 [ 2137.599281] __sys_sendmsg+0xe5/0x1b0 [ 2137.600325] ? __sys_sendmsg_sock+0x40/0x40 [ 2137.601503] ? rcu_read_lock_any_held+0x75/0xa0 [ 2137.602816] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2137.604255] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2137.605658] ? trace_hardirqs_on+0x5b/0x180 [ 2137.606665] do_syscall_64+0x33/0x40 [ 2137.607686] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2137.609090] RIP: 0033:0x7fb362bacb19 04:00:52 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:00:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 22) 04:00:52 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5382, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:00:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xf0ffffffffffff}, 0x0) 04:00:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227a, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:00:52 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x600}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2137.609968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2137.614633] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2137.616159] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2137.617596] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2137.619064] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2137.620494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2137.621938] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 04:00:52 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2137.671105] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2137.728482] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:01:06 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x700}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:01:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 23) [ 2151.804352] FAULT_INJECTION: forcing a failure. [ 2151.804352] name failslab, interval 1, probability 0, space 0, times 0 [ 2151.805642] CPU: 1 PID: 11646 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2151.806550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2151.807620] Call Trace: [ 2151.807968] dump_stack+0x107/0x167 [ 2151.808444] should_fail.cold+0x5/0xa [ 2151.808941] ? create_object.isra.0+0x3a/0xa20 [ 2151.809536] should_failslab+0x5/0x20 [ 2151.810041] kmem_cache_alloc+0x5b/0x310 [ 2151.810572] create_object.isra.0+0x3a/0xa20 [ 2151.811141] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2151.811797] __kmalloc_node+0x1ae/0x420 [ 2151.812202] crypto_create_tfm_node+0x84/0x340 [ 2151.812793] crypto_spawn_tfm2+0x60/0xc0 [ 2151.813319] crypto_gcm_init_tfm+0x6d/0x260 [ 2151.813877] ? crypto_rfc4106_init_tfm+0x1b0/0x1b0 [ 2151.814532] crypto_aead_init_tfm+0x13b/0x1a0 [ 2151.815113] crypto_create_tfm_node+0x117/0x340 [ 2151.815717] crypto_spawn_tfm2+0x60/0xc0 [ 2151.816243] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2151.816876] crypto_rfc4106_init_tfm+0x3d/0x1b0 [ 2151.817477] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2151.818120] crypto_aead_init_tfm+0x13b/0x1a0 [ 2151.818698] crypto_create_tfm_node+0x117/0x340 [ 2151.819301] crypto_spawn_tfm2+0x60/0xc0 [ 2151.819825] aead_init_geniv+0x1c3/0x330 [ 2151.820350] ? kasan_unpoison_shadow+0x33/0x50 [ 2151.820938] ? aead_geniv_free+0x20/0x20 [ 2151.821464] crypto_aead_init_tfm+0x13b/0x1a0 [ 2151.822054] crypto_create_tfm_node+0x117/0x340 [ 2151.822654] crypto_alloc_tfm_node+0x108/0x270 [ 2151.823249] esp_init_aead+0xf6/0x2f0 [ 2151.823741] ? esp6_destroy+0x60/0x60 [ 2151.824234] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2151.824832] ? static_obj+0x40/0xc0 [ 2151.825305] ? __xfrm_init_state+0x6ca/0x1490 [ 2151.825881] ? lock_downgrade+0x6d0/0x6d0 [ 2151.826441] esp6_init_state+0x7a/0x420 [ 2151.826961] __xfrm_init_state+0x778/0x1490 [ 2151.827522] xfrm_add_sa+0x1ec5/0x3510 [ 2151.828026] ? xfrm_send_acquire+0xa50/0xa50 [ 2151.828464] ? security_capable+0x95/0xc0 [ 2151.828998] ? __nla_parse+0x3e/0x50 [ 2151.829485] ? xfrm_send_acquire+0xa50/0xa50 [ 2151.830063] xfrm_user_rcv_msg+0x416/0x830 [ 2151.830609] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2151.831283] ? __mutex_lock+0x4fe/0x10b0 [ 2151.831804] ? __lockdep_reset_lock+0x180/0x180 [ 2151.832387] netlink_rcv_skb+0x14b/0x430 [ 2151.832792] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2151.833286] ? netlink_ack+0xab0/0xab0 [ 2151.833678] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2151.834147] xfrm_netlink_rcv+0x6b/0x90 [ 2151.834540] netlink_unicast+0x549/0x7f0 [ 2151.834945] ? netlink_attachskb+0x870/0x870 [ 2151.835383] ? __virt_addr_valid+0x128/0x350 [ 2151.835823] netlink_sendmsg+0x90f/0xdf0 [ 2151.836229] ? netlink_unicast+0x7f0/0x7f0 [ 2151.836656] ? netlink_unicast+0x7f0/0x7f0 [ 2151.837073] sock_sendmsg+0x154/0x190 [ 2151.837449] ____sys_sendmsg+0x70d/0x870 [ 2151.837849] ? kernel_sendmsg+0x50/0x50 [ 2151.838249] ? do_recvmmsg+0x6d0/0x6d0 [ 2151.838633] ? perf_trace_lock+0xac/0x490 [ 2151.839047] ? __lockdep_reset_lock+0x180/0x180 [ 2151.839508] ? perf_trace_lock+0xac/0x490 [ 2151.839920] ___sys_sendmsg+0xf3/0x170 [ 2151.840305] ? sendmsg_copy_msghdr+0x160/0x160 [ 2151.840757] ? lock_downgrade+0x6d0/0x6d0 [ 2151.841167] ? find_held_lock+0x2c/0x110 [ 2151.841576] ? __fget_files+0x296/0x4c0 [ 2151.841980] ? __fget_light+0xea/0x290 [ 2151.842370] __sys_sendmsg+0xe5/0x1b0 [ 2151.842745] ? __sys_sendmsg_sock+0x40/0x40 [ 2151.843172] ? rcu_read_lock_any_held+0x75/0xa0 [ 2151.843659] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2151.844202] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2151.844727] ? trace_hardirqs_on+0x5b/0x180 [ 2151.845173] do_syscall_64+0x33/0x40 [ 2151.845552] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2151.846086] RIP: 0033:0x7fb362bacb19 [ 2151.846468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2151.848333] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2151.849086] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2151.849813] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2151.850542] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2151.851274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2151.851976] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 04:01:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x100000000000000}, 0x0) 04:01:06 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227b, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:01:06 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2151.884104] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x200000000000000}, 0x0) [ 2151.908704] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:06 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5386, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:06 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x300000000000000}, 0x0) 04:01:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:01:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:01:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227c, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:01:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 24) 04:01:06 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x541b, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:06 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x172b}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2152.061406] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2152.065417] FAULT_INJECTION: forcing a failure. [ 2152.065417] name failslab, interval 1, probability 0, space 0, times 0 [ 2152.066584] CPU: 1 PID: 11687 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2152.067297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2152.068132] Call Trace: [ 2152.068411] dump_stack+0x107/0x167 [ 2152.068789] should_fail.cold+0x5/0xa [ 2152.069182] ? __crypto_alloc_tfm+0xc6/0x460 [ 2152.069675] should_failslab+0x5/0x20 [ 2152.070076] __kmalloc+0x72/0x390 [ 2152.070438] ? mark_held_locks+0x9e/0xe0 [ 2152.070858] __crypto_alloc_tfm+0xc6/0x460 [ 2152.071297] crypto_spawn_tfm+0x8e/0x110 [ 2152.071709] ? skcipher_register_instance+0x280/0x280 [ 2152.072235] skcipher_init_tfm_simple+0x46/0xd0 [ 2152.072715] crypto_skcipher_init_tfm+0x12a/0x180 [ 2152.073209] crypto_create_tfm_node+0x117/0x340 [ 2152.073687] crypto_spawn_tfm2+0x60/0xc0 [ 2152.074114] crypto_gcm_init_tfm+0x6d/0x260 [ 2152.074553] ? crypto_rfc4106_init_tfm+0x1b0/0x1b0 [ 2152.075048] crypto_aead_init_tfm+0x13b/0x1a0 [ 2152.075506] crypto_create_tfm_node+0x117/0x340 [ 2152.076004] crypto_spawn_tfm2+0x60/0xc0 [ 2152.076445] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2152.076977] crypto_rfc4106_init_tfm+0x3d/0x1b0 [ 2152.077477] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2152.078020] crypto_aead_init_tfm+0x13b/0x1a0 [ 2152.078492] crypto_create_tfm_node+0x117/0x340 [ 2152.078990] crypto_spawn_tfm2+0x60/0xc0 [ 2152.079420] aead_init_geniv+0x1c3/0x330 [ 2152.079851] ? kasan_unpoison_shadow+0x33/0x50 [ 2152.080339] ? aead_geniv_free+0x20/0x20 [ 2152.080772] crypto_aead_init_tfm+0x13b/0x1a0 [ 2152.081264] crypto_create_tfm_node+0x117/0x340 [ 2152.081766] crypto_alloc_tfm_node+0x108/0x270 [ 2152.082277] esp_init_aead+0xf6/0x2f0 [ 2152.082679] ? esp6_destroy+0x60/0x60 [ 2152.083091] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2152.083594] ? static_obj+0x40/0xc0 [ 2152.083994] ? __xfrm_init_state+0x6ca/0x1490 [ 2152.084482] ? lock_downgrade+0x6d0/0x6d0 [ 2152.084928] esp6_init_state+0x7a/0x420 [ 2152.085344] __xfrm_init_state+0x778/0x1490 [ 2152.085815] xfrm_add_sa+0x1ec5/0x3510 [ 2152.086246] ? xfrm_send_acquire+0xa50/0xa50 [ 2152.086706] ? security_capable+0x95/0xc0 [ 2152.087162] ? __nla_parse+0x3e/0x50 [ 2152.087567] ? xfrm_send_acquire+0xa50/0xa50 [ 2152.088032] xfrm_user_rcv_msg+0x416/0x830 [ 2152.088465] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2152.089020] ? __mutex_lock+0x4fe/0x10b0 [ 2152.089433] ? __lockdep_reset_lock+0x180/0x180 [ 2152.089910] netlink_rcv_skb+0x14b/0x430 [ 2152.090351] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2152.090862] ? netlink_ack+0xab0/0xab0 [ 2152.091272] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2152.091750] xfrm_netlink_rcv+0x6b/0x90 [ 2152.092154] netlink_unicast+0x549/0x7f0 [ 2152.092577] ? netlink_attachskb+0x870/0x870 [ 2152.093021] ? __virt_addr_valid+0x128/0x350 [ 2152.093537] netlink_sendmsg+0x90f/0xdf0 [ 2152.094086] ? netlink_unicast+0x7f0/0x7f0 [ 2152.094546] ? netlink_unicast+0x7f0/0x7f0 [ 2152.095098] sock_sendmsg+0x154/0x190 [ 2152.095499] ____sys_sendmsg+0x70d/0x870 [ 2152.096031] ? kernel_sendmsg+0x50/0x50 [ 2152.096458] ? do_recvmmsg+0x6d0/0x6d0 [ 2152.096963] ? perf_trace_lock+0xac/0x490 [ 2152.097399] ? __lockdep_reset_lock+0x180/0x180 [ 2152.098003] ? perf_trace_lock+0xac/0x490 [ 2152.098430] ? SOFTIRQ_verbose+0x10/0x10 [ 2152.098846] ___sys_sendmsg+0xf3/0x170 [ 2152.099250] ? sendmsg_copy_msghdr+0x160/0x160 [ 2152.099730] ? lock_downgrade+0x6d0/0x6d0 [ 2152.100160] ? find_held_lock+0x2c/0x110 [ 2152.100589] ? __fget_files+0x296/0x4c0 [ 2152.101003] ? __fget_light+0xea/0x290 [ 2152.101414] __sys_sendmsg+0xe5/0x1b0 [ 2152.101803] ? __sys_sendmsg_sock+0x40/0x40 [ 2152.102275] ? rcu_read_lock_any_held+0x75/0xa0 [ 2152.102761] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2152.103305] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2152.103824] ? trace_hardirqs_on+0x5b/0x180 [ 2152.104273] do_syscall_64+0x33/0x40 [ 2152.104650] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2152.105178] RIP: 0033:0x7fb362bacb19 [ 2152.105558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2152.107437] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2152.108212] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2152.108953] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2152.109688] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2152.110427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2152.111157] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 04:01:06 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2152.171147] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:20 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x2b17}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x900000000000000}, 0x0) 04:01:20 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227d, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:01:20 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5421, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:01:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:01:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 25) [ 2166.190439] FAULT_INJECTION: forcing a failure. [ 2166.190439] name failslab, interval 1, probability 0, space 0, times 0 [ 2166.191610] CPU: 1 PID: 11722 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2166.192513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2166.193589] Call Trace: [ 2166.193940] dump_stack+0x107/0x167 [ 2166.194367] should_fail.cold+0x5/0xa [ 2166.194754] ? create_object.isra.0+0x3a/0xa20 [ 2166.195206] should_failslab+0x5/0x20 [ 2166.195582] kmem_cache_alloc+0x5b/0x310 [ 2166.195987] create_object.isra.0+0x3a/0xa20 [ 2166.196424] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2166.196926] __kmalloc+0x16e/0x390 [ 2166.197287] ? mark_held_locks+0x9e/0xe0 [ 2166.197695] __crypto_alloc_tfm+0xc6/0x460 [ 2166.198129] crypto_spawn_tfm+0x8e/0x110 [ 2166.198534] ? skcipher_register_instance+0x280/0x280 [ 2166.199042] skcipher_init_tfm_simple+0x46/0xd0 [ 2166.199510] crypto_skcipher_init_tfm+0x12a/0x180 [ 2166.199988] crypto_create_tfm_node+0x117/0x340 [ 2166.200450] crypto_spawn_tfm2+0x60/0xc0 [ 2166.200856] crypto_gcm_init_tfm+0x6d/0x260 [ 2166.201283] ? crypto_rfc4106_init_tfm+0x1b0/0x1b0 [ 2166.201768] crypto_aead_init_tfm+0x13b/0x1a0 [ 2166.202230] crypto_create_tfm_node+0x117/0x340 [ 2166.202734] crypto_spawn_tfm2+0x60/0xc0 [ 2166.203173] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2166.203700] crypto_rfc4106_init_tfm+0x3d/0x1b0 [ 2166.204157] ? crypto_rfc4543_init_tfm+0x220/0x220 [ 2166.204698] crypto_aead_init_tfm+0x13b/0x1a0 [ 2166.205176] crypto_create_tfm_node+0x117/0x340 [ 2166.205678] crypto_spawn_tfm2+0x60/0xc0 [ 2166.206080] aead_init_geniv+0x1c3/0x330 [ 2166.206527] ? kasan_unpoison_shadow+0x33/0x50 [ 2166.207019] ? aead_geniv_free+0x20/0x20 [ 2166.207456] crypto_aead_init_tfm+0x13b/0x1a0 [ 2166.207947] crypto_create_tfm_node+0x117/0x340 [ 2166.208451] crypto_alloc_tfm_node+0x108/0x270 [ 2166.208955] esp_init_aead+0xf6/0x2f0 [ 2166.209364] ? esp6_destroy+0x60/0x60 [ 2166.209772] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2166.210288] ? static_obj+0x40/0xc0 [ 2166.210694] ? __xfrm_init_state+0x6ca/0x1490 [ 2166.211178] ? lock_downgrade+0x6d0/0x6d0 [ 2166.211641] esp6_init_state+0x7a/0x420 [ 2166.212074] __xfrm_init_state+0x778/0x1490 [ 2166.212550] xfrm_add_sa+0x1ec5/0x3510 [ 2166.212972] ? xfrm_send_acquire+0xa50/0xa50 [ 2166.213456] ? security_capable+0x95/0xc0 [ 2166.213901] ? __nla_parse+0x3e/0x50 [ 2166.214318] ? xfrm_send_acquire+0xa50/0xa50 [ 2166.214797] xfrm_user_rcv_msg+0x416/0x830 [ 2166.215257] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2166.215823] ? __mutex_lock+0x4fe/0x10b0 [ 2166.216260] ? __lockdep_reset_lock+0x180/0x180 [ 2166.216781] netlink_rcv_skb+0x14b/0x430 [ 2166.217184] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2166.217723] ? netlink_ack+0xab0/0xab0 [ 2166.218159] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2166.218655] xfrm_netlink_rcv+0x6b/0x90 [ 2166.219082] netlink_unicast+0x549/0x7f0 [ 2166.219531] ? netlink_attachskb+0x870/0x870 [ 2166.220009] ? __virt_addr_valid+0x128/0x350 [ 2166.220492] netlink_sendmsg+0x90f/0xdf0 [ 2166.220931] ? netlink_unicast+0x7f0/0x7f0 [ 2166.221392] ? netlink_unicast+0x7f0/0x7f0 [ 2166.221846] sock_sendmsg+0x154/0x190 [ 2166.222229] ____sys_sendmsg+0x70d/0x870 [ 2166.222635] ? kernel_sendmsg+0x50/0x50 [ 2166.223074] ? do_recvmmsg+0x6d0/0x6d0 [ 2166.223508] ? perf_trace_lock+0xac/0x490 [ 2166.223959] ? __lockdep_reset_lock+0x180/0x180 [ 2166.224456] ? perf_trace_lock+0xac/0x490 [ 2166.224902] ? SOFTIRQ_verbose+0x10/0x10 [ 2166.225341] ___sys_sendmsg+0xf3/0x170 [ 2166.225760] ? sendmsg_copy_msghdr+0x160/0x160 [ 2166.226270] ? lock_downgrade+0x6d0/0x6d0 [ 2166.226721] ? find_held_lock+0x2c/0x110 [ 2166.227167] ? __fget_files+0x296/0x4c0 [ 2166.227606] ? __fget_light+0xea/0x290 [ 2166.228032] __sys_sendmsg+0xe5/0x1b0 [ 2166.228442] ? __sys_sendmsg_sock+0x40/0x40 [ 2166.228906] ? rcu_read_lock_any_held+0x75/0xa0 [ 2166.229422] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2166.229983] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2166.230551] ? trace_hardirqs_on+0x5b/0x180 [ 2166.231012] do_syscall_64+0x33/0x40 [ 2166.231417] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2166.231961] RIP: 0033:0x7fb362bacb19 [ 2166.232363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2166.234352] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2166.235180] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2166.235952] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2166.236717] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2166.237480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2166.238262] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2166.245387] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xa00000000000000}, 0x0) 04:01:21 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5450, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2166.298231] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0xf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:01:21 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:21 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5451, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:01:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227e, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2166.432346] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 26) 04:01:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:01:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xf00000000000000}, 0x0) 04:01:33 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0xe0ffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x14}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:01:33 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:33 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227f, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:01:33 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5452, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2178.957161] FAULT_INJECTION: forcing a failure. [ 2178.957161] name failslab, interval 1, probability 0, space 0, times 0 [ 2178.960060] CPU: 0 PID: 11757 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2178.961665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2178.963612] Call Trace: [ 2178.964239] dump_stack+0x107/0x167 [ 2178.965090] should_fail.cold+0x5/0xa [ 2178.965968] ? crypto_gcm_setkey+0x141/0x590 [ 2178.967027] should_failslab+0x5/0x20 [ 2178.967914] __kmalloc+0x72/0x390 [ 2178.968739] ? crypto_skcipher_setkey+0x19f/0x340 [ 2178.969858] crypto_gcm_setkey+0x141/0x590 [ 2178.971072] crypto_aead_setkey+0xc8/0x2a0 [ 2178.972151] crypto_rfc4106_setkey+0xda/0x120 [ 2178.973294] crypto_aead_setkey+0xc8/0x2a0 [ 2178.974401] crypto_aead_setkey+0xc8/0x2a0 [ 2178.975490] esp_init_aead+0x1a8/0x2f0 [ 2178.976563] ? esp6_destroy+0x60/0x60 [ 2178.977524] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2178.978688] ? static_obj+0x40/0xc0 [ 2178.979621] ? __xfrm_init_state+0x6ca/0x1490 [ 2178.980735] ? lock_downgrade+0x6d0/0x6d0 [ 2178.981776] esp6_init_state+0x7a/0x420 [ 2178.982784] __xfrm_init_state+0x778/0x1490 [ 2178.983882] xfrm_add_sa+0x1ec5/0x3510 [ 2178.984860] ? xfrm_send_acquire+0xa50/0xa50 [ 2178.985943] ? security_capable+0x95/0xc0 [ 2178.987056] ? __nla_parse+0x3e/0x50 [ 2178.987850] ? xfrm_send_acquire+0xa50/0xa50 [ 2178.988797] xfrm_user_rcv_msg+0x416/0x830 [ 2178.989691] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2178.990813] ? __mutex_lock+0x4fe/0x10b0 [ 2178.991685] ? __lockdep_reset_lock+0x180/0x180 [ 2178.992679] netlink_rcv_skb+0x14b/0x430 [ 2178.993541] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2178.994622] ? netlink_ack+0xab0/0xab0 [ 2178.995470] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2178.996441] xfrm_netlink_rcv+0x6b/0x90 [ 2178.997287] netlink_unicast+0x549/0x7f0 [ 2178.998147] ? netlink_attachskb+0x870/0x870 [ 2178.999089] ? __virt_addr_valid+0x128/0x350 [ 2179.000036] netlink_sendmsg+0x90f/0xdf0 [ 2179.000882] ? netlink_unicast+0x7f0/0x7f0 [ 2179.001794] ? netlink_unicast+0x7f0/0x7f0 [ 2179.002695] sock_sendmsg+0x154/0x190 [ 2179.003515] ____sys_sendmsg+0x70d/0x870 [ 2179.004376] ? kernel_sendmsg+0x50/0x50 [ 2179.005213] ? do_recvmmsg+0x6d0/0x6d0 [ 2179.006033] ? perf_trace_lock+0xac/0x490 [ 2179.006908] ? __lockdep_reset_lock+0x180/0x180 [ 2179.007899] ? perf_trace_lock+0xac/0x490 [ 2179.008769] ___sys_sendmsg+0xf3/0x170 [ 2179.009602] ? sendmsg_copy_msghdr+0x160/0x160 [ 2179.010581] ? lock_downgrade+0x6d0/0x6d0 [ 2179.011467] ? find_held_lock+0x2c/0x110 [ 2179.012326] ? __fget_files+0x296/0x4c0 [ 2179.013181] ? __fget_light+0xea/0x290 [ 2179.013995] __sys_sendmsg+0xe5/0x1b0 [ 2179.014809] ? __sys_sendmsg_sock+0x40/0x40 [ 2179.015728] ? rcu_read_lock_any_held+0x75/0xa0 [ 2179.016734] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2179.017814] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2179.018921] ? trace_hardirqs_on+0x5b/0x180 [ 2179.019855] do_syscall_64+0x33/0x40 [ 2179.020661] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2179.021730] RIP: 0033:0x7fb362bacb19 [ 2179.022539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2179.026422] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2179.028020] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2179.029527] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2179.031043] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2179.032556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2179.034058] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2179.049279] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x2000000000000000}, 0x0) [ 2179.072252] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:01:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x2a01000000000000}, 0x0) [ 2179.137136] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x4000000000000000}, 0x0) [ 2192.803456] FAULT_INJECTION: forcing a failure. [ 2192.803456] name failslab, interval 1, probability 0, space 0, times 0 [ 2192.805983] CPU: 0 PID: 11803 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2192.807486] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2192.809275] Call Trace: [ 2192.809855] dump_stack+0x107/0x167 [ 2192.810662] should_fail.cold+0x5/0xa [ 2192.811491] ? create_object.isra.0+0x3a/0xa20 [ 2192.812484] should_failslab+0x5/0x20 [ 2192.813309] kmem_cache_alloc+0x5b/0x310 [ 2192.814194] ? aes_expandkey+0x56/0xd90 [ 2192.815090] create_object.isra.0+0x3a/0xa20 [ 2192.816045] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2192.817149] __kmalloc+0x16e/0x390 [ 2192.817938] ? crypto_skcipher_setkey+0x19f/0x340 [ 2192.818998] crypto_gcm_setkey+0x141/0x590 [ 2192.819924] crypto_aead_setkey+0xc8/0x2a0 [ 2192.820848] crypto_rfc4106_setkey+0xda/0x120 [ 2192.821816] crypto_aead_setkey+0xc8/0x2a0 [ 2192.822760] crypto_aead_setkey+0xc8/0x2a0 [ 2192.823682] esp_init_aead+0x1a8/0x2f0 [ 2192.824527] ? esp6_destroy+0x60/0x60 [ 2192.825352] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2192.826356] ? static_obj+0x40/0xc0 [ 2192.827162] ? __xfrm_init_state+0x6ca/0x1490 [ 2192.828133] ? lock_downgrade+0x6d0/0x6d0 [ 2192.829046] esp6_init_state+0x7a/0x420 [ 2192.829910] __xfrm_init_state+0x778/0x1490 [ 2192.830868] xfrm_add_sa+0x1ec5/0x3510 [ 2192.831722] ? xfrm_send_acquire+0xa50/0xa50 [ 2192.832677] ? security_capable+0x95/0xc0 [ 2192.833577] ? __nla_parse+0x3e/0x50 [ 2192.834387] ? xfrm_send_acquire+0xa50/0xa50 [ 2192.835374] xfrm_user_rcv_msg+0x416/0x830 [ 2192.836301] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2192.837479] ? __mutex_lock+0x4fe/0x10b0 [ 2192.838360] ? __lockdep_reset_lock+0x180/0x180 [ 2192.839382] netlink_rcv_skb+0x14b/0x430 [ 2192.840264] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2192.841345] ? netlink_ack+0xab0/0xab0 [ 2192.842204] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2192.843219] xfrm_netlink_rcv+0x6b/0x90 [ 2192.844081] netlink_unicast+0x549/0x7f0 [ 2192.844970] ? netlink_attachskb+0x870/0x870 [ 2192.845922] ? __virt_addr_valid+0x128/0x350 [ 2192.846900] netlink_sendmsg+0x90f/0xdf0 [ 2192.847799] ? netlink_unicast+0x7f0/0x7f0 [ 2192.848735] ? netlink_unicast+0x7f0/0x7f0 [ 2192.849646] sock_sendmsg+0x154/0x190 [ 2192.850479] ____sys_sendmsg+0x70d/0x870 [ 2192.851359] ? kernel_sendmsg+0x50/0x50 [ 2192.852215] ? do_recvmmsg+0x6d0/0x6d0 [ 2192.853053] ? perf_trace_lock+0xac/0x490 [ 2192.853954] ? __lockdep_reset_lock+0x180/0x180 [ 2192.854973] ? perf_trace_lock+0xac/0x490 [ 2192.855863] ? SOFTIRQ_verbose+0x10/0x10 [ 2192.856742] ___sys_sendmsg+0xf3/0x170 [ 2192.857586] ? sendmsg_copy_msghdr+0x160/0x160 [ 2192.858588] ? lock_downgrade+0x6d0/0x6d0 [ 2192.859488] ? find_held_lock+0x2c/0x110 [ 2192.860375] ? __fget_files+0x296/0x4c0 [ 2192.861243] ? __fget_light+0xea/0x290 [ 2192.862092] __sys_sendmsg+0xe5/0x1b0 [ 2192.862933] ? __sys_sendmsg_sock+0x40/0x40 [ 2192.863859] ? rcu_read_lock_any_held+0x75/0xa0 [ 2192.864885] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2192.866016] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2192.867135] ? trace_hardirqs_on+0x5b/0x180 [ 2192.868068] do_syscall_64+0x33/0x40 [ 2192.868874] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2192.869978] RIP: 0033:0x7fb362bacb19 [ 2192.870809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2192.874766] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2192.876406] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2192.877941] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2192.879481] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2192.881018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2192.882567] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 04:01:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x166}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:01:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:01:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x4503000000000000}, 0x0) 04:01:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2282, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:01:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 27) 04:01:47 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d40000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:47 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x1000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:47 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5460, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:47 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x40049409, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x9effffff00000000}, 0x0) [ 2192.932721] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 28) [ 2192.966120] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:47 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d40000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2283, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:01:47 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x2000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2193.078709] FAULT_INJECTION: forcing a failure. [ 2193.078709] name failslab, interval 1, probability 0, space 0, times 0 [ 2193.081212] CPU: 0 PID: 11832 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2193.082739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2193.084561] Call Trace: [ 2193.085147] dump_stack+0x107/0x167 [ 2193.085954] should_fail.cold+0x5/0xa [ 2193.086803] ? gf128mul_init_4k_lle+0x4e/0x3f0 [ 2193.087809] should_failslab+0x5/0x20 [ 2193.088646] kmem_cache_alloc_trace+0x55/0x320 [ 2193.089659] gf128mul_init_4k_lle+0x4e/0x3f0 [ 2193.090657] ghash_setkey+0xd6/0x1a0 [ 2193.091477] ? ghash_update+0x4b0/0x4b0 [ 2193.092367] shash_async_setkey+0xda/0x230 [ 2193.093300] crypto_ahash_setkey+0xbf/0x2e0 [ 2193.094248] crypto_gcm_setkey+0x3d2/0x590 [ 2193.095194] crypto_aead_setkey+0xc8/0x2a0 [ 2193.096127] crypto_rfc4106_setkey+0xda/0x120 [ 2193.097114] crypto_aead_setkey+0xc8/0x2a0 [ 2193.098047] crypto_aead_setkey+0xc8/0x2a0 [ 2193.098989] esp_init_aead+0x1a8/0x2f0 [ 2193.099842] ? esp6_destroy+0x60/0x60 [ 2193.100677] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2193.101697] ? static_obj+0x40/0xc0 [ 2193.102505] ? __xfrm_init_state+0x6ca/0x1490 [ 2193.103486] ? lock_downgrade+0x6d0/0x6d0 [ 2193.104395] esp6_init_state+0x7a/0x420 [ 2193.105269] __xfrm_init_state+0x778/0x1490 [ 2193.106207] xfrm_add_sa+0x1ec5/0x3510 [ 2193.107077] ? xfrm_send_acquire+0xa50/0xa50 [ 2193.108032] ? security_capable+0x95/0xc0 [ 2193.108933] ? __nla_parse+0x3e/0x50 [ 2193.109753] ? xfrm_send_acquire+0xa50/0xa50 [ 2193.110707] xfrm_user_rcv_msg+0x416/0x830 [ 2193.111644] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2193.112778] ? __mutex_lock+0x4fe/0x10b0 [ 2193.113664] ? __lockdep_reset_lock+0x180/0x180 [ 2193.114690] netlink_rcv_skb+0x14b/0x430 [ 2193.115587] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2193.116665] ? netlink_ack+0xab0/0xab0 [ 2193.117519] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2193.118517] xfrm_netlink_rcv+0x6b/0x90 [ 2193.119375] netlink_unicast+0x549/0x7f0 [ 2193.120255] ? netlink_attachskb+0x870/0x870 [ 2193.121210] ? __virt_addr_valid+0x128/0x350 [ 2193.122173] netlink_sendmsg+0x90f/0xdf0 [ 2193.123069] ? netlink_unicast+0x7f0/0x7f0 [ 2193.124001] ? netlink_unicast+0x7f0/0x7f0 [ 2193.124914] sock_sendmsg+0x154/0x190 [ 2193.125738] ____sys_sendmsg+0x70d/0x870 [ 2193.126631] ? kernel_sendmsg+0x50/0x50 [ 2193.127486] ? do_recvmmsg+0x6d0/0x6d0 [ 2193.128320] ? perf_trace_lock+0xac/0x490 [ 2193.129222] ? __lockdep_reset_lock+0x180/0x180 [ 2193.130222] ? perf_trace_lock+0xac/0x490 [ 2193.131130] ___sys_sendmsg+0xf3/0x170 [ 2193.131969] ? sendmsg_copy_msghdr+0x160/0x160 [ 2193.132961] ? lock_downgrade+0x6d0/0x6d0 [ 2193.133857] ? find_held_lock+0x2c/0x110 [ 2193.134749] ? __fget_files+0x296/0x4c0 [ 2193.135614] ? __fget_light+0xea/0x290 [ 2193.136459] __sys_sendmsg+0xe5/0x1b0 [ 2193.137275] ? __sys_sendmsg_sock+0x40/0x40 [ 2193.138204] ? rcu_read_lock_any_held+0x75/0xa0 [ 2193.139243] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2193.140372] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2193.141478] ? trace_hardirqs_on+0x5b/0x180 [ 2193.142409] do_syscall_64+0x33/0x40 [ 2193.143225] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2193.144326] RIP: 0033:0x7fb362bacb19 [ 2193.145129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2193.149080] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2193.150733] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2193.152262] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2193.153787] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2193.155323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2193.156854] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2193.180281] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:01:47 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d40000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:48 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3fc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:01:48 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x40086602, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 29) 04:01:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:01:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xe401000000000000}, 0x0) 04:01:48 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2193.433133] FAULT_INJECTION: forcing a failure. [ 2193.433133] name failslab, interval 1, probability 0, space 0, times 0 [ 2193.435619] CPU: 0 PID: 11858 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2193.437134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2193.438977] Call Trace: [ 2193.439563] dump_stack+0x107/0x167 [ 2193.440366] should_fail.cold+0x5/0xa [ 2193.441205] ? create_object.isra.0+0x3a/0xa20 [ 2193.442206] should_failslab+0x5/0x20 [ 2193.443061] kmem_cache_alloc+0x5b/0x310 [ 2193.443948] ? skcipher_walk_done+0x526/0xc70 [ 2193.444941] create_object.isra.0+0x3a/0xa20 [ 2193.445904] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2193.447025] kmem_cache_alloc_trace+0x151/0x320 [ 2193.448055] gf128mul_init_4k_lle+0x4e/0x3f0 [ 2193.449045] ghash_setkey+0xd6/0x1a0 [ 2193.449880] ? ghash_update+0x4b0/0x4b0 [ 2193.450775] shash_async_setkey+0xda/0x230 [ 2193.451712] crypto_ahash_setkey+0xbf/0x2e0 [ 2193.452667] crypto_gcm_setkey+0x3d2/0x590 [ 2193.453617] crypto_aead_setkey+0xc8/0x2a0 [ 2193.454572] crypto_rfc4106_setkey+0xda/0x120 [ 2193.455558] crypto_aead_setkey+0xc8/0x2a0 [ 2193.456506] crypto_aead_setkey+0xc8/0x2a0 [ 2193.457442] esp_init_aead+0x1a8/0x2f0 [ 2193.458299] ? esp6_destroy+0x60/0x60 [ 2193.459147] ? xfrm_state_get_afinfo+0x20/0x2b0 [ 2193.460181] ? static_obj+0x40/0xc0 [ 2193.460995] ? __xfrm_init_state+0x6ca/0x1490 [ 2193.461978] ? lock_downgrade+0x6d0/0x6d0 [ 2193.462924] esp6_init_state+0x7a/0x420 [ 2193.463812] __xfrm_init_state+0x778/0x1490 [ 2193.464771] xfrm_add_sa+0x1ec5/0x3510 [ 2193.465641] ? xfrm_send_acquire+0xa50/0xa50 [ 2193.466621] ? security_capable+0x95/0xc0 [ 2193.467541] ? __nla_parse+0x3e/0x50 [ 2193.468373] ? xfrm_send_acquire+0xa50/0xa50 [ 2193.469342] xfrm_user_rcv_msg+0x416/0x830 [ 2193.470287] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2193.471473] ? __mutex_lock+0x4fe/0x10b0 [ 2193.472372] ? __lockdep_reset_lock+0x180/0x180 [ 2193.473408] netlink_rcv_skb+0x14b/0x430 [ 2193.474308] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2193.475422] ? netlink_ack+0xab0/0xab0 [ 2193.476300] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2193.477314] xfrm_netlink_rcv+0x6b/0x90 [ 2193.478195] netlink_unicast+0x549/0x7f0 [ 2193.479113] ? netlink_attachskb+0x870/0x870 [ 2193.480082] ? __virt_addr_valid+0x128/0x350 [ 2193.481077] netlink_sendmsg+0x90f/0xdf0 [ 2193.481992] ? netlink_unicast+0x7f0/0x7f0 [ 2193.482961] ? netlink_unicast+0x7f0/0x7f0 [ 2193.483897] sock_sendmsg+0x154/0x190 [ 2193.484743] ____sys_sendmsg+0x70d/0x870 [ 2193.485646] ? kernel_sendmsg+0x50/0x50 [ 2193.486535] ? do_recvmmsg+0x6d0/0x6d0 [ 2193.487410] ? perf_trace_lock+0xac/0x490 [ 2193.488346] ? __lockdep_reset_lock+0x180/0x180 [ 2193.489379] ? perf_trace_lock+0xac/0x490 [ 2193.490302] ? SOFTIRQ_verbose+0x10/0x10 [ 2193.491230] ___sys_sendmsg+0xf3/0x170 [ 2193.492102] ? sendmsg_copy_msghdr+0x160/0x160 [ 2193.493126] ? lock_downgrade+0x6d0/0x6d0 [ 2193.494056] ? find_held_lock+0x2c/0x110 [ 2193.494988] ? __fget_files+0x296/0x4c0 [ 2193.495894] ? __fget_light+0xea/0x290 [ 2193.496774] __sys_sendmsg+0xe5/0x1b0 [ 2193.497627] ? __sys_sendmsg_sock+0x40/0x40 [ 2193.498609] ? rcu_read_lock_any_held+0x75/0xa0 [ 2193.499669] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2193.500856] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2193.502026] ? trace_hardirqs_on+0x5b/0x180 [ 2193.503023] do_syscall_64+0x33/0x40 [ 2193.503885] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2193.505053] RIP: 0033:0x7fb362bacb19 [ 2193.505905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2193.510110] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2193.511866] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2193.513499] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2193.515109] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2193.516689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2193.518335] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 04:01:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:01:48 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x40087602, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:01:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xf0ffffff00000000}, 0x0) 04:01:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2284, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:01:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 30) [ 2193.646542] FAULT_INJECTION: forcing a failure. [ 2193.646542] name failslab, interval 1, probability 0, space 0, times 0 [ 2193.649353] CPU: 1 PID: 11874 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2193.650715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2193.652315] Call Trace: [ 2193.652835] dump_stack+0x107/0x167 [ 2193.653556] should_fail.cold+0x5/0xa [ 2193.654314] ? __alloc_skb+0x6d/0x5b0 [ 2193.655112] should_failslab+0x5/0x20 [ 2193.655931] kmem_cache_alloc_node+0x55/0x330 [ 2193.656874] ? find_held_lock+0x2c/0x110 [ 2193.657686] __alloc_skb+0x6d/0x5b0 [ 2193.658398] ? xfrm_find_acq_byseq+0xc0/0xc0 [ 2193.659327] xfrm_send_state_notify+0xc32/0x1ae0 [ 2193.660247] ? xfrm_send_policy_notify+0x1670/0x1670 [ 2193.661261] ? trace_hardirqs_on+0x5b/0x180 [ 2193.662124] ? xfrm_state_add+0x5d7/0xe30 [ 2193.662988] ? __local_bh_enable_ip+0x9d/0x100 [ 2193.664139] ? xfrm_send_policy_notify+0x1670/0x1670 [ 2193.665386] km_state_notify+0xab/0x240 [ 2193.666350] xfrm_add_sa+0x23f3/0x3510 [ 2193.667199] ? xfrm_send_acquire+0xa50/0xa50 [ 2193.668124] ? __nla_parse+0x3e/0x50 [ 2193.668897] ? xfrm_send_acquire+0xa50/0xa50 [ 2193.669790] xfrm_user_rcv_msg+0x416/0x830 [ 2193.670747] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2193.671833] ? __mutex_lock+0x4fe/0x10b0 [ 2193.672636] ? __lockdep_reset_lock+0x180/0x180 [ 2193.673582] netlink_rcv_skb+0x14b/0x430 [ 2193.674422] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2193.675443] ? netlink_ack+0xab0/0xab0 [ 2193.676256] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2193.677194] xfrm_netlink_rcv+0x6b/0x90 [ 2193.678010] netlink_unicast+0x549/0x7f0 [ 2193.678852] ? netlink_attachskb+0x870/0x870 [ 2193.679727] ? __virt_addr_valid+0x128/0x350 [ 2193.680618] netlink_sendmsg+0x90f/0xdf0 [ 2193.681455] ? netlink_unicast+0x7f0/0x7f0 [ 2193.682328] ? netlink_unicast+0x7f0/0x7f0 [ 2193.683197] sock_sendmsg+0x154/0x190 [ 2193.683957] ____sys_sendmsg+0x70d/0x870 [ 2193.684777] ? kernel_sendmsg+0x50/0x50 [ 2193.685605] ? do_recvmmsg+0x6d0/0x6d0 [ 2193.686397] ? perf_trace_lock+0xac/0x490 [ 2193.687276] ? __lockdep_reset_lock+0x180/0x180 [ 2193.688215] ? perf_trace_lock+0xac/0x490 [ 2193.689054] ___sys_sendmsg+0xf3/0x170 [ 2193.689879] ? sendmsg_copy_msghdr+0x160/0x160 [ 2193.690821] ? lock_downgrade+0x6d0/0x6d0 [ 2193.691668] ? find_held_lock+0x2c/0x110 [ 2193.692507] ? __fget_files+0x296/0x4c0 [ 2193.693345] ? __fget_light+0xea/0x290 [ 2193.694136] __sys_sendmsg+0xe5/0x1b0 [ 2193.694908] ? __sys_sendmsg_sock+0x40/0x40 [ 2193.695775] ? rcu_read_lock_any_held+0x75/0xa0 [ 2193.696750] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2193.697796] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2193.698840] ? trace_hardirqs_on+0x5b/0x180 [ 2193.699695] do_syscall_64+0x33/0x40 [ 2193.700434] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2193.701442] RIP: 0033:0x7fb362bacb19 [ 2193.702170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2193.705796] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2193.707277] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2193.708670] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2193.710060] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2193.711485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2193.712902] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2193.742630] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2193.784025] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:02:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:02:00 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x3000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x10036c86, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:02:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xfeffffff00000000}, 0x0) 04:02:00 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:00 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x4020940d, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 31) 04:02:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2285, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2205.943319] FAULT_INJECTION: forcing a failure. [ 2205.943319] name failslab, interval 1, probability 0, space 0, times 0 [ 2205.944312] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2205.945775] CPU: 1 PID: 11892 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2205.948087] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2205.949882] Call Trace: [ 2205.950460] dump_stack+0x107/0x167 [ 2205.951267] should_fail.cold+0x5/0xa [ 2205.952094] ? SOFTIRQ_verbose+0x10/0x10 [ 2205.952990] ? __alloc_skb+0x6d/0x5b0 [ 2205.953830] should_failslab+0x5/0x20 [ 2205.954687] kmem_cache_alloc_node+0x55/0x330 [ 2205.955678] ? find_held_lock+0x2c/0x110 [ 2205.956572] __alloc_skb+0x6d/0x5b0 [ 2205.957358] ? xfrm_find_acq_byseq+0xc0/0xc0 [ 2205.958305] xfrm_send_state_notify+0xc32/0x1ae0 [ 2205.959351] ? xfrm_send_policy_notify+0x1670/0x1670 [ 2205.960443] ? trace_hardirqs_on+0x5b/0x180 [ 2205.961365] ? xfrm_state_add+0x5d7/0xe30 [ 2205.962248] ? __local_bh_enable_ip+0x9d/0x100 [ 2205.963250] ? xfrm_send_policy_notify+0x1670/0x1670 [ 2205.964344] km_state_notify+0xab/0x240 [ 2205.965203] xfrm_add_sa+0x23f3/0x3510 [ 2205.966049] ? xfrm_send_acquire+0xa50/0xa50 [ 2205.967007] ? __nla_parse+0x3e/0x50 [ 2205.967811] ? xfrm_send_acquire+0xa50/0xa50 [ 2205.968754] xfrm_user_rcv_msg+0x416/0x830 [ 2205.969669] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2205.970815] ? __mutex_lock+0x4fe/0x10b0 [ 2205.971687] ? __lockdep_reset_lock+0x180/0x180 [ 2205.972695] netlink_rcv_skb+0x14b/0x430 [ 2205.973572] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2205.974646] ? netlink_ack+0xab0/0xab0 [ 2205.975497] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2205.976484] xfrm_netlink_rcv+0x6b/0x90 [ 2205.977339] netlink_unicast+0x549/0x7f0 [ 2205.978218] ? netlink_attachskb+0x870/0x870 [ 2205.979176] ? __virt_addr_valid+0x128/0x350 [ 2205.980134] netlink_sendmsg+0x90f/0xdf0 [ 2205.981012] ? netlink_unicast+0x7f0/0x7f0 [ 2205.981933] ? netlink_unicast+0x7f0/0x7f0 [ 2205.982880] sock_sendmsg+0x154/0x190 [ 2205.983697] ____sys_sendmsg+0x70d/0x870 [ 2205.984572] ? kernel_sendmsg+0x50/0x50 [ 2205.985424] ? do_recvmmsg+0x6d0/0x6d0 [ 2205.986257] ? perf_trace_lock+0xac/0x490 [ 2205.987171] ? __lockdep_reset_lock+0x180/0x180 [ 2205.988169] ? perf_trace_lock+0xac/0x490 [ 2205.989053] ? SOFTIRQ_verbose+0x10/0x10 [ 2205.989929] ___sys_sendmsg+0xf3/0x170 [ 2205.990771] ? sendmsg_copy_msghdr+0x160/0x160 [ 2205.991770] ? lock_downgrade+0x6d0/0x6d0 [ 2205.992658] ? find_held_lock+0x2c/0x110 [ 2205.993538] ? __fget_files+0x296/0x4c0 [ 2205.994403] ? __fget_light+0xea/0x290 [ 2205.995254] __sys_sendmsg+0xe5/0x1b0 [ 2205.996070] ? __sys_sendmsg_sock+0x40/0x40 [ 2205.996995] ? rcu_read_lock_any_held+0x75/0xa0 [ 2205.998022] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2205.999162] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2206.000266] ? trace_hardirqs_on+0x5b/0x180 [ 2206.001190] do_syscall_64+0x33/0x40 [ 2206.001997] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2206.003120] RIP: 0033:0x7fb362bacb19 [ 2206.003922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2206.007905] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2206.009554] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2206.011092] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2206.012625] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2206.014154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2206.015709] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2206.031684] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:02:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xffffff7f00000000}, 0x0) 04:02:14 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:02:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x10040000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2219.571692] FAULT_INJECTION: forcing a failure. [ 2219.571692] name failslab, interval 1, probability 0, space 0, times 0 [ 2219.574320] CPU: 1 PID: 11926 Comm: syz-executor.3 Not tainted 5.10.184 #1 04:02:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 32) 04:02:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2286, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:02:14 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x80086601, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0xfffffffffffff000}, 0x0) 04:02:14 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:14 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x4000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2219.575885] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2219.577884] Call Trace: [ 2219.578474] dump_stack+0x107/0x167 [ 2219.579310] should_fail.cold+0x5/0xa [ 2219.580174] should_failslab+0x5/0x20 [ 2219.581018] __kmalloc_node_track_caller+0x74/0x3b0 [ 2219.582117] ? xfrm_send_state_notify+0xc32/0x1ae0 [ 2219.583235] __alloc_skb+0xb1/0x5b0 [ 2219.584057] xfrm_send_state_notify+0xc32/0x1ae0 [ 2219.585115] ? xfrm_send_policy_notify+0x1670/0x1670 [ 2219.586234] ? trace_hardirqs_on+0x5b/0x180 [ 2219.587215] ? xfrm_state_add+0x5d7/0xe30 [ 2219.588138] ? __local_bh_enable_ip+0x9d/0x100 [ 2219.589000] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2219.589148] ? xfrm_send_policy_notify+0x1670/0x1670 [ 2219.591475] km_state_notify+0xab/0x240 [ 2219.592357] xfrm_add_sa+0x23f3/0x3510 [ 2219.593228] ? xfrm_send_acquire+0xa50/0xa50 [ 2219.594207] ? __nla_parse+0x3e/0x50 [ 2219.595070] ? xfrm_send_acquire+0xa50/0xa50 [ 2219.596048] xfrm_user_rcv_msg+0x416/0x830 [ 2219.596994] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2219.598160] ? __mutex_lock+0x4fe/0x10b0 [ 2219.599076] ? __lockdep_reset_lock+0x180/0x180 [ 2219.600125] netlink_rcv_skb+0x14b/0x430 [ 2219.601028] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2219.602132] ? netlink_ack+0xab0/0xab0 [ 2219.603039] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2219.604063] xfrm_netlink_rcv+0x6b/0x90 [ 2219.604958] netlink_unicast+0x549/0x7f0 [ 2219.605873] ? netlink_attachskb+0x870/0x870 [ 2219.606859] ? __virt_addr_valid+0x128/0x350 [ 2219.607858] netlink_sendmsg+0x90f/0xdf0 [ 2219.608753] ? netlink_unicast+0x7f0/0x7f0 [ 2219.609693] ? netlink_unicast+0x7f0/0x7f0 [ 2219.610625] sock_sendmsg+0x154/0x190 [ 2219.611504] ____sys_sendmsg+0x70d/0x870 [ 2219.612582] ? kernel_sendmsg+0x50/0x50 [ 2219.613624] ? do_recvmmsg+0x6d0/0x6d0 [ 2219.614642] ? perf_trace_lock+0xac/0x490 [ 2219.615749] ? __lockdep_reset_lock+0x180/0x180 [ 2219.616971] ? perf_trace_lock+0xac/0x490 [ 2219.618072] ___sys_sendmsg+0xf3/0x170 [ 2219.619082] ? sendmsg_copy_msghdr+0x160/0x160 [ 2219.620094] ? lock_downgrade+0x6d0/0x6d0 [ 2219.621003] ? find_held_lock+0x2c/0x110 [ 2219.621904] ? __fget_files+0x296/0x4c0 [ 2219.622787] ? __fget_light+0xea/0x290 [ 2219.623660] __sys_sendmsg+0xe5/0x1b0 [ 2219.624506] ? __sys_sendmsg_sock+0x40/0x40 [ 2219.625445] ? rcu_read_lock_any_held+0x75/0xa0 [ 2219.626524] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2219.627695] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2219.628828] ? trace_hardirqs_on+0x5b/0x180 [ 2219.629775] do_syscall_64+0x33/0x40 [ 2219.630591] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2219.631710] RIP: 0033:0x7fb362bacb19 [ 2219.632539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2219.636558] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2219.638212] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2219.639777] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2219.641343] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2219.642906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2219.644458] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2219.703643] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:02:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x11000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:02:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2287, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:02:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x2}, 0x0) 04:02:14 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x80087601, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:14 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x3}, 0x0) 04:02:14 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:14 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:02:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:02:29 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 33) 04:02:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2288, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:02:29 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x5000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x8}, 0x0) 04:02:29 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2234.520729] FAULT_INJECTION: forcing a failure. [ 2234.520729] name failslab, interval 1, probability 0, space 0, times 0 [ 2234.522181] CPU: 1 PID: 11978 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2234.523014] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2234.524021] Call Trace: [ 2234.524348] dump_stack+0x107/0x167 [ 2234.524811] should_fail.cold+0x5/0xa [ 2234.525268] ? trace_hardirqs_on+0x5b/0x180 [ 2234.525784] ? create_object.isra.0+0x3a/0xa20 [ 2234.526348] should_failslab+0x5/0x20 [ 2234.526806] kmem_cache_alloc+0x5b/0x310 [ 2234.527314] create_object.isra.0+0x3a/0xa20 [ 2234.527850] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2234.528459] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2234.529058] ? xfrm_send_state_notify+0xc32/0x1ae0 [ 2234.529662] __alloc_skb+0xb1/0x5b0 [ 2234.530106] xfrm_send_state_notify+0xc32/0x1ae0 [ 2234.530675] ? xfrm_send_policy_notify+0x1670/0x1670 [ 2234.531301] ? trace_hardirqs_on+0x5b/0x180 [ 2234.531826] ? xfrm_state_add+0x5d7/0xe30 [ 2234.532314] ? __local_bh_enable_ip+0x9d/0x100 [ 2234.532854] ? xfrm_send_policy_notify+0x1670/0x1670 [ 2234.533456] km_state_notify+0xab/0x240 [ 2234.533930] xfrm_add_sa+0x23f3/0x3510 [ 2234.534407] ? xfrm_send_acquire+0xa50/0xa50 [ 2234.534930] ? __nla_parse+0x3e/0x50 [ 2234.535396] ? xfrm_send_acquire+0xa50/0xa50 [ 2234.535914] xfrm_user_rcv_msg+0x416/0x830 [ 2234.536419] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2234.537048] ? __mutex_lock+0x4fe/0x10b0 [ 2234.537537] ? __lockdep_reset_lock+0x180/0x180 [ 2234.538106] netlink_rcv_skb+0x14b/0x430 [ 2234.538589] ? copy_to_user_tmpl.part.0+0x610/0x610 [ 2234.539190] ? netlink_ack+0xab0/0xab0 [ 2234.539666] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2234.540227] xfrm_netlink_rcv+0x6b/0x90 [ 2234.540702] netlink_unicast+0x549/0x7f0 [ 2234.541189] ? netlink_attachskb+0x870/0x870 [ 2234.541710] ? __virt_addr_valid+0x128/0x350 [ 2234.542238] netlink_sendmsg+0x90f/0xdf0 [ 2234.542727] ? netlink_unicast+0x7f0/0x7f0 [ 2234.543273] ? netlink_unicast+0x7f0/0x7f0 [ 2234.543772] sock_sendmsg+0x154/0x190 [ 2234.544227] ____sys_sendmsg+0x70d/0x870 [ 2234.544711] ? kernel_sendmsg+0x50/0x50 [ 2234.545178] ? do_recvmmsg+0x6d0/0x6d0 [ 2234.545645] ? perf_trace_lock+0xac/0x490 [ 2234.546145] ? __lockdep_reset_lock+0x180/0x180 [ 2234.546697] ? perf_trace_lock+0xac/0x490 [ 2234.547220] ___sys_sendmsg+0xf3/0x170 [ 2234.547689] ? sendmsg_copy_msghdr+0x160/0x160 [ 2234.548249] ? lock_downgrade+0x6d0/0x6d0 [ 2234.548748] ? find_held_lock+0x2c/0x110 [ 2234.549249] ? __fget_files+0x296/0x4c0 [ 2234.549730] ? __fget_light+0xea/0x290 [ 2234.550206] __sys_sendmsg+0xe5/0x1b0 [ 2234.550658] ? __sys_sendmsg_sock+0x40/0x40 [ 2234.551189] ? rcu_read_lock_any_held+0x75/0xa0 [ 2234.551761] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2234.552390] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2234.552997] ? trace_hardirqs_on+0x5b/0x180 [ 2234.553516] do_syscall_64+0x33/0x40 [ 2234.553967] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2234.554589] RIP: 0033:0x7fb362bacb19 [ 2234.555034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2234.557245] RSP: 002b:00007fb360122188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2234.558134] RAX: ffffffffffffffda RBX: 00007fb362cbff60 RCX: 00007fb362bacb19 [ 2234.558993] RDX: 0000000000000000 RSI: 0000000020002e00 RDI: 0000000000000003 [ 2234.559836] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2234.560679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2234.561533] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 [ 2234.573016] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:02:29 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, 0x0, 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2234.608726] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:02:29 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0189436, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x9}, 0x0) 04:02:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2289, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:02:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:02:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) (fail_nth: 34) [ 2234.753806] FAULT_INJECTION: forcing a failure. [ 2234.753806] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2234.756823] CPU: 1 PID: 12004 Comm: syz-executor.3 Not tainted 5.10.184 #1 [ 2234.758501] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2234.760494] Call Trace: [ 2234.761131] dump_stack+0x107/0x167 [ 2234.762005] should_fail.cold+0x5/0xa [ 2234.762934] _copy_to_user+0x2e/0x180 [ 2234.763861] simple_read_from_buffer+0xcc/0x160 [ 2234.764991] proc_fail_nth_read+0x198/0x230 [ 2234.766030] ? proc_sessionid_read+0x230/0x230 [ 2234.767153] ? security_file_permission+0x24e/0x570 [ 2234.768350] ? perf_trace_initcall_start+0x101/0x380 [ 2234.769579] ? proc_sessionid_read+0x230/0x230 [ 2234.770673] vfs_read+0x228/0x580 [ 2234.771530] ksys_read+0x12d/0x260 [ 2234.772389] ? vfs_write+0xa70/0xa70 [ 2234.773297] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2234.774565] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2234.775810] do_syscall_64+0x33/0x40 [ 2234.776718] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2234.777952] RIP: 0033:0x7fb362b5f69c [ 2234.778854] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2234.783306] RSP: 002b:00007fb360122170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2234.785137] RAX: ffffffffffffffda RBX: 0000000000000160 RCX: 00007fb362b5f69c [ 2234.786857] RDX: 000000000000000f RSI: 00007fb3601221e0 RDI: 0000000000000004 [ 2234.788608] RBP: 00007fb3601221d0 R08: 0000000000000000 R09: 0000000000000000 [ 2234.790334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2234.792069] R13: 00007fff8c7c3d6f R14: 00007fb360122300 R15: 0000000000022000 04:02:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xa}, 0x0) [ 2234.822359] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:02:29 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, 0x0, 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x4b47, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:02:44 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x6000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:44 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc020660b, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:44 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:02:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x4b49, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:02:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xf}, 0x0) 04:02:44 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, 0x0, 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:02:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2250.039641] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:02:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2250.069260] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:02:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xf0}, 0x0) 04:02:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5382, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:02:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:02:44 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481223, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2250.161046] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:02:56 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x7000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:02:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:02:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:02:56 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x12a}, 0x0) 04:02:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:02:56 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481225, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2262.091299] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:02:56 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122a, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:56 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:02:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x1e4}, 0x0) [ 2262.122458] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:02:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:02:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2262.261120] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2262.300924] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:03:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x4, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2274.527812] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:03:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5386, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:03:09 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x2b170000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x300}, 0x0) 04:03:09 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122b, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:09 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2274.545288] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42010000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:03:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x5, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:03:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x345}, 0x0) [ 2274.660552] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:09 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122d, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43010000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:03:09 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2274.765445] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x541b, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2274.788743] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x6, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:03:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:03:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x900}, 0x0) [ 2274.892652] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2274.913628] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:23 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0xffffe000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xa00}, 0x0) 04:03:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:03:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:03:23 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122e, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x7, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:03:23 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5421, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:03:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x8, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2288.529357] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2288.565747] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xf00}, 0x0) 04:03:23 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5450, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:03:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x9, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:03:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x60000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:03:23 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048122f, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2288.678777] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:23 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0xe0ffff00000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:03:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2288.777522] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:36 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x100000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:36 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481230, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xa, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:03:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x22}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:03:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x2000}, 0x0) 04:03:36 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:03:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:03:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5451, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2301.695096] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xb, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:03:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x2a01}, 0x0) 04:03:36 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481258, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2301.738465] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:03:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x4000}, 0x0) [ 2301.864610] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5452, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:03:50 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481263, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x23}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:03:50 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x200000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xf, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:03:50 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:03:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:03:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x4503}, 0x0) 04:03:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x10, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:03:50 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2315.351131] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x11, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:03:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xe401}, 0x0) 04:03:50 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481264, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2315.397035] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:03:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xf000}, 0x0) 04:03:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x866c0310, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:03:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5460, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:03:50 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481269, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:03:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xf0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2315.558494] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2315.595792] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:04:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x34000}, 0x0) 04:04:02 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:04:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:04:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x300, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:04:02 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:02 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x300000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:02 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048126c, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x40049409, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:04:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x80000}, 0x0) [ 2327.585651] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:04:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x35f, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:04:02 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc048126f, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2327.636232] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:04:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x400300}, 0x0) 04:04:02 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x40086602, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:04:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:04:02 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x400000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x500, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2327.808227] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:04:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xf0ffff}, 0x0) 04:04:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:04:16 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:16 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x500000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x40087602, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:04:16 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481270, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x600, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:04:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2341.916687] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:04:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x1000000}, 0x0) 04:04:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x700, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2341.944426] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:04:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xe61c0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:04:16 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481275, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2342.132239] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:04:16 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x600000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x4020940d, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:04:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x2000000}, 0x0) 04:04:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x900, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:04:16 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xa00, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:04:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:04:31 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x700000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:31 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x3000000}, 0x0) 04:04:31 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481278, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2356.503883] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2356.538698] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:04:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x80086601, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:04:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xb00, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:04:31 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:04:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x9000000}, 0x0) 04:04:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xf00, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:04:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:04:31 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2356.623230] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:04:31 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x80087601, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:04:31 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x2b17000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2356.799548] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2356.872468] blktrace: Concurrent blktraces are not allowed on sg0 04:04:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xa000000}, 0x0) 04:04:43 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x2, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:04:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x1100, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:04:43 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:04:43 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0045878, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:04:43 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x2}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x5f03, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2369.154068] blktrace: Concurrent blktraces are not allowed on sg0 04:04:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xf000000}, 0x0) [ 2369.181073] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2369.214696] blktrace: Concurrent blktraces are not allowed on sg0 04:04:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:04:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:04:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x20000000}, 0x0) 04:04:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xf000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:04:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0045878, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:04:57 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x7, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:57 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:57 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x3}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:04:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x80000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:04:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x2a010000}, 0x0) [ 2382.962894] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2382.983055] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:04:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:04:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0189436, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2383.032949] blktrace: Concurrent blktraces are not allowed on sg0 04:04:57 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x8, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x40000000}, 0x0) [ 2383.090033] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:04:57 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:04:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xf0ffff, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:05:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x45030000}, 0x0) 04:05:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:05:12 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x4}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:05:12 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc020660b, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:05:12 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0xa, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x1000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2397.653555] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:05:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x2000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2397.696405] blktrace: Concurrent blktraces are not allowed on sg0 04:05:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x9effffff}, 0x0) [ 2397.735205] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:05:12 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481223, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:05:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:05:12 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0xc, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xe4010000}, 0x0) 04:05:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x3000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:05:12 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x5}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2397.950073] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2397.974097] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:05:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xf0ffffff}, 0x0) 04:05:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2398.110645] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:05:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x4000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:05:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:05:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xfeffffff}, 0x0) 04:05:13 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xffffe000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:05:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x5000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:05:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xfffff000}, 0x0) [ 2398.282877] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:05:13 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x6}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:13 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x6000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:05:13 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffbff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2398.468704] blktrace: Concurrent blktraces are not allowed on sg0 04:05:28 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 04:05:28 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481225, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:05:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xffffff7f}, 0x0) 04:05:28 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x30, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x7000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:05:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:05:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0xd1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:05:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xffffff9e}, 0x0) [ 2413.365074] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:05:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x8000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:05:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:05:43 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 04:05:43 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x300}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:43 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x16f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:05:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x9000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:05:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122a, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:05:43 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x48, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 2429.148089] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:05:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xa000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:05:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xfffffffe}, 0x0) [ 2429.180645] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:05:44 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000600)) 04:05:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:05:55 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x0, &(0x7f0000000600)) 04:05:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xb000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:05:55 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x4c, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:05:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122b, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:05:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:05:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x8000000000000}, 0x0) 04:05:55 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x500}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2441.188233] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:05:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x40030000000000}, 0x0) [ 2441.218036] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:05:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xf000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:05:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:05:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) [ 2441.343844] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:05:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x10000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:06:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x100000000000000}, 0x0) 04:06:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122d, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:06:09 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x68, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:09 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x0, &(0x7f0000000600)) 04:06:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:06:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x11000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:06:09 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x600}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:06:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x200000000000000}, 0x0) [ 2455.078673] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:06:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x5f030000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2455.120081] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:06:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x300000000000000}, 0x0) [ 2455.144804] blktrace: Concurrent blktraces are not allowed on sg0 04:06:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x8dffffff, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:06:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:06:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x9effffff, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:06:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x900000000000000}, 0x0) 04:06:10 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x0, &(0x7f0000000600)) 04:06:10 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122e, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:06:10 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x6c, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:06:10 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x700}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:06:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:06:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:06:23 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x172b}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:06:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xfcffffff, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:06:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xa00000000000000}, 0x0) 04:06:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122f, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:06:23 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x74, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:23 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, 0x0) 04:06:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xf00000000000000}, 0x0) [ 2468.524708] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2468.537732] blktrace: Concurrent blktraces are not allowed on sg0 04:06:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xfffff000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2468.555793] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2468.617736] blktrace: Concurrent blktraces are not allowed on sg0 04:06:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:06:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x2000000000000000}, 0x0) 04:06:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xffffff7f, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:06:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481230, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:06:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:06:36 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, 0x0) 04:06:36 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x7a, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:36 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x2b17}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:36 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, 0x0) [ 2482.064046] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:06:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xffffff8d, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2482.103226] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:06:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x2a01000000000000}, 0x0) 04:06:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:06:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xffffff9e, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2482.254215] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:06:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:06:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:06:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x4000000000000000}, 0x0) 04:06:37 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0xe0ffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481258, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:06:37 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x700, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xfffffff0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:06:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x4503000000000000}, 0x0) [ 2482.455440] blktrace: Concurrent blktraces are not allowed on sg0 [ 2482.462976] blktrace: Concurrent blktraces are not allowed on sg0 [ 2482.472463] blktrace: Concurrent blktraces are not allowed on sg0 04:06:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:06:49 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x1000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:06:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 04:06:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xffffff8d, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:06:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xfffffffc, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:06:49 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0xa00, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:06:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481263, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2494.636868] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:06:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:06:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xe401000000000000}, 0x0) 04:06:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xffffffff, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2494.658731] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:06:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2494.789114] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:07:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:07:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 04:07:03 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0xa00, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:07:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481264, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:07:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="0f000000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:03 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x2000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:07:03 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0xc00, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:07:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2508.323525] blktrace: Concurrent blktraces are not allowed on sg0 [ 2508.331426] blktrace: Concurrent blktraces are not allowed on sg0 [ 2508.349797] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2508.352595] blktrace: Concurrent blktraces are not allowed on sg0 04:07:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xfeffffff00000000}, 0x0) 04:07:03 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0xa00, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2508.398339] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:07:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="10000000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2508.541163] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:07:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 2508.566769] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:07:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="f0000000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:03 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x3000, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:07:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:07:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:07:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481269, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2508.708072] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:07:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048126c, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:07:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="c0020000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x3000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:07:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 04:07:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:07:16 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x4000, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2521.647478] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:07:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="c00e0000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 04:07:16 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x2000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2521.689332] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2521.698714] blktrace: Concurrent blktraces are not allowed on sg0 04:07:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:07:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="e03f0300100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2521.747000] blktrace: Concurrent blktraces are not allowed on sg0 04:07:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2}, 0x0) 04:07:16 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x4800, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2521.813871] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:07:16 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x4000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:07:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048126f, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:07:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:07:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x8dffffff, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="e0060020100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2521.887499] blktrace: Concurrent blktraces are not allowed on sg0 [ 2521.898111] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:07:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x3}, 0x0) 04:07:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="00f0ff7f100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2521.968079] blktrace: Concurrent blktraces are not allowed on sg0 04:07:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481270, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:07:30 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x5000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:07:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xe0ffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:07:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:07:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x0) 04:07:30 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x4c00, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:07:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="effdffff100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x5000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x9}, 0x0) 04:07:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2535.704716] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:07:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60020000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2535.749570] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2535.757544] blktrace: Concurrent blktraces are not allowed on sg0 04:07:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60050000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x4000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:44 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:07:44 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x6800, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:07:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481275, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:07:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xa}, 0x0) 04:07:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:07:44 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x6000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:07:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60080000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2549.512899] blktrace: Concurrent blktraces are not allowed on sg0 [ 2549.520604] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2549.544414] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:07:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x1000000, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60100000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:07:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:07:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf}, 0x0) [ 2549.633061] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:07:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481278, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2549.654929] blktrace: Concurrent blktraces are not allowed on sg0 [ 2549.665686] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:08:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:08:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 04:08:04 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x7000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60690000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:08:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:08:04 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x6c00, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2569.584771] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:08:04 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x2, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:08:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x12a}, 0x0) [ 2569.606693] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:08:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2569.678475] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:08:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="607b0000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:08:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1e4}, 0x0) [ 2569.710050] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:08:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2569.753436] blktrace: Concurrent blktraces are not allowed on sg0 [ 2569.757317] blktrace: Concurrent blktraces are not allowed on sg0 04:08:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:08:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60000300100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:08:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x300}, 0x0) [ 2569.867585] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:08:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="6000ff00100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:08:19 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:19 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x7400, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:19 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x2b170000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x2, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:08:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:08:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x345}, 0x0) 04:08:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2584.848676] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2584.875073] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:08:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x900}, 0x0) 04:08:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60012a00000001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:08:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2584.948458] blktrace: Concurrent blktraces are not allowed on sg0 [ 2584.950801] blktrace: Concurrent blktraces are not allowed on sg0 04:08:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 04:08:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010200100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2585.044700] blktrace: Concurrent blktraces are not allowed on sg0 04:08:19 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:08:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x7, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:08:19 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x7a00, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 04:08:19 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0xffffe000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6f01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2585.229863] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2585.253880] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2585.293578] blktrace: Concurrent blktraces are not allowed on sg0 [ 2585.358658] blktrace: Concurrent blktraces are not allowed on sg0 04:08:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010300100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:08:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:08:32 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0xe0ffff00000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:08:32 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000}, 0x0) 04:08:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x8, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:08:32 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x402, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2598.154070] blktrace: Concurrent blktraces are not allowed on sg0 [ 2598.159400] blktrace: Concurrent blktraces are not allowed on sg0 04:08:32 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x403, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010400100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:08:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2a01}, 0x0) [ 2598.199760] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2598.214617] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:08:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:08:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010500100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:08:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 04:08:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010600100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2598.350621] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:08:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:08:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4503}, 0x0) 04:08:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:08:33 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x100000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:33 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() 04:08:33 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0xa, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2598.504705] blktrace: Concurrent blktraces are not allowed on sg0 04:08:46 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() 04:08:46 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x404, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:46 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x200000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xe401}, 0x0) 04:08:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010700100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:08:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xd00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:08:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0xc, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:08:46 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0xd100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2611.813022] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:08:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010800100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2611.859614] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2611.927825] blktrace: Concurrent blktraces are not allowed on sg0 04:08:59 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x300000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:08:59 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) gettid() 04:08:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x30, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:08:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010900100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:08:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xf00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:09:00 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x405, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:09:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:08:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 04:09:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010a00100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2625.246719] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2625.286163] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2625.312701] blktrace: Concurrent blktraces are not allowed on sg0 04:09:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 04:09:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010b00100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:09:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x10036c8600000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:09:00 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 04:09:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1da688}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:09:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80000}, 0x0) 04:09:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010f00100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:09:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:09:12 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) 04:09:12 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x400000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:09:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1004000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:09:12 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x407, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:09:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 04:09:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x48, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:09:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) [ 2637.343879] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:09:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60011000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2637.352614] blktrace: Concurrent blktraces are not allowed on sg0 [ 2637.363984] blktrace: Concurrent blktraces are not allowed on sg0 [ 2637.371190] blktrace: Concurrent blktraces are not allowed on sg0 [ 2637.379777] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:09:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 04:09:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60011100100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:09:12 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x414, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:09:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2637.461393] blktrace: Concurrent blktraces are not allowed on sg0 04:09:12 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) [ 2637.481205] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:09:12 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x45f, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:09:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 2637.699025] blktrace: Concurrent blktraces are not allowed on sg0 04:09:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="6001f000100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:09:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 04:09:25 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x24924924, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:09:25 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) 04:09:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:09:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x4c, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:09:25 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x500000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:09:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2650.641911] blktrace: Concurrent blktraces are not allowed on sg0 [ 2650.674163] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2650.691745] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:09:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 04:09:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010003100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:09:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:09:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) [ 2650.800346] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2653.071365] systemd-timesyn invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2653.072839] CPU: 0 PID: 131 Comm: systemd-timesyn Not tainted 5.10.184 #1 [ 2653.073616] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2653.074505] Call Trace: [ 2653.074805] dump_stack+0x107/0x167 [ 2653.075206] dump_header+0x106/0x65e [ 2653.075631] oom_kill_process.cold+0x10/0x15 [ 2653.076141] out_of_memory+0x1149/0x1440 [ 2653.076615] ? oom_killer_disable+0x280/0x280 [ 2653.077130] ? mutex_trylock+0x237/0x2b0 [ 2653.077596] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2653.078267] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2653.078941] ? lock_acquire+0xd7/0x470 [ 2653.079387] ? warn_alloc+0x190/0x190 [ 2653.079836] __alloc_pages_nodemask+0x51d/0x600 [ 2653.080391] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2653.081073] ? find_get_entry+0x2c8/0x740 [ 2653.081546] alloc_pages_current+0x187/0x280 [ 2653.082050] __page_cache_alloc+0x2d2/0x360 [ 2653.082542] pagecache_get_page+0x2c7/0xc80 [ 2653.083038] filemap_fault+0x177d/0x2210 [ 2653.083503] ? read_cache_page_gfp+0x30/0x30 [ 2653.084009] ? replace_page_cache_page+0x1200/0x1200 [ 2653.084594] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2653.085195] ext4_filemap_fault+0x87/0xc0 [ 2653.085668] __do_fault+0x113/0x410 [ 2653.086062] handle_mm_fault+0x1e72/0x3520 [ 2653.086537] ? find_held_lock+0x2c/0x110 [ 2653.086998] ? __pmd_alloc+0x5e0/0x5e0 [ 2653.087451] ? vmacache_find+0x55/0x2a0 [ 2653.087914] do_user_addr_fault+0x56e/0xc60 [ 2653.088408] exc_page_fault+0xa2/0x1a0 [ 2653.088857] ? asm_exc_page_fault+0x8/0x30 [ 2653.089337] asm_exc_page_fault+0x1e/0x30 [ 2653.089789] RIP: 0033:0x7f326de4c9d0 [ 2653.090218] Code: Unable to access opcode bytes at RIP 0x7f326de4c9a6. [ 2653.090956] RSP: 002b:00007fff5e89a758 EFLAGS: 00010246 [ 2653.091565] RAX: 00000000000000e2 RBX: 00007fff5e89a780 RCX: 0000000000000000 [ 2653.092353] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00005599dc9be370 [ 2653.093169] RBP: 00005599dc9be370 R08: 0000000000000000 R09: 00007fff5e8e7080 [ 2653.093933] R10: 00007fff5e8e70f0 R11: 0000000000000000 R12: 00007fff5e89a778 [ 2653.094753] R13: 00005599dc9b8310 R14: 0000000000000702 R15: 0000000000000000 [ 2653.095630] Mem-Info: [ 2653.095948] active_anon:320 inactive_anon:59846 isolated_anon:0 [ 2653.095948] active_file:112 inactive_file:137 isolated_file:0 [ 2653.095948] unevictable:0 dirty:0 writeback:0 [ 2653.095948] slab_reclaimable:8777 slab_unreclaimable:61230 [ 2653.095948] mapped:69706 shmem:105 pagetables:1789 bounce:0 [ 2653.095948] free:2900 free_pcp:2 free_cma:0 [ 2653.099490] Node 0 active_anon:1280kB inactive_anon:239384kB active_file:448kB inactive_file:548kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278824kB dirty:0kB writeback:0kB shmem:420kB writeback_tmp:0kB kernel_stack:4448kB all_unreclaimable? no [ 2653.102102] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2653.105038] lowmem_reserve[]: 0 1616 1616 1616 [ 2653.105574] Node 0 DMA32 free:5116kB min:13308kB low:14960kB high:16612kB reserved_highatomic:2048KB active_anon:1280kB inactive_anon:239384kB active_file:540kB inactive_file:548kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:7156kB bounce:0kB free_pcp:8kB local_pcp:8kB free_cma:0kB [ 2653.108783] lowmem_reserve[]: 0 0 0 0 [ 2653.109264] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 2653.110909] Node 0 DMA32: 529*4kB (UMH) 165*8kB (UMH) 65*16kB (UMH) 4*32kB (MH) 2*64kB (H) 1*128kB (H) 0*256kB 1*512kB (H) 0*1024kB 0*2048kB 0*4096kB = 5372kB [ 2653.112699] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2653.113724] 377 total pagecache pages [ 2653.114181] 0 pages in swap cache [ 2653.114579] Swap cache stats: add 0, delete 0, find 0/0 [ 2653.115228] Free swap = 0kB [ 2653.115584] Total swap = 0kB [ 2653.115903] 524158 pages RAM [ 2653.116269] 0 pages HighMem/MovableOnly [ 2653.116722] 105055 pages reserved [ 2653.117142] Unreclaimable slab info: [ 2653.117788] Name Used Total [ 2653.118482] pid_3 7KB 7KB [ 2653.119118] pid_2 93KB 93KB [ 2653.119751] IEEE-802.15.4-MAC 63KB 63KB [ 2653.120404] IEEE-802.15.4-RAW 31KB 31KB [ 2653.121048] p9_req_t 8KB 8KB [ 2653.121684] ip6-frags 15KB 15KB [ 2653.122330] fib6_nodes 28KB 28KB [ 2653.122937] ip6_dst_cache 37KB 37KB [ 2653.123530] PINGv6 63KB 63KB [ 2653.124139] RAWv6 378KB 378KB [ 2653.124739] UDPLITEv6 62KB 62KB [ 2653.125347] UDPv6 62KB 62KB [ 2653.125952] tw_sock_TCPv6 15KB 15KB [ 2653.126543] request_sock_TCPv6 15KB 15KB [ 2653.127162] TCPv6 62KB 62KB [ 2653.127752] scsi_sense_cache 8KB 8KB [ 2653.128376] sd_ext_cdb 3KB 3KB [ 2653.128980] virtio_scsi_cmd 16KB 16KB [ 2653.129574] sgpool-128 59KB 59KB [ 2653.130176] sgpool-64 63KB 63KB [ 2653.130771] sgpool-32 63KB 63KB [ 2653.131384] sgpool-16 82KB 82KB [ 2653.132018] sgpool-8 63KB 63KB [ 2653.132653] io_kiocb 45KB 60KB [ 2653.133250] mqueue_inode_cache 62KB 62KB [ 2653.133884] nfs_commit_data 15KB 15KB [ 2653.134518] nfs_write_data 47KB 47KB [ 2653.135154] jbd2_inode 7KB 7KB [ 2653.135772] ext4_system_zone 7KB 7KB [ 2653.136437] ext4_io_end_vec 7KB 7KB [ 2653.137071] ext4_bio_post_read_ctx 15KB 15KB [ 2653.137734] kioctx 31KB 31KB [ 2653.138323] aio_kiocb 7KB 7KB [ 2653.138958] dio 30KB 30KB [ 2653.139565] bio-2 4KB 4KB [ 2653.140174] fasync_cache 7KB 7KB [ 2653.140772] pid_namespace 7KB 7KB [ 2653.141354] posix_timers_cache 15KB 15KB [ 2653.141970] rpc_buffers 31KB 31KB [ 2653.142558] rpc_tasks 3KB 3KB [ 2653.143162] UNIX 264KB 352KB [ 2653.143755] UDP-Lite 31KB 31KB [ 2653.144377] tcp_bind_bucket 8KB 8KB [ 2653.144984] xfrm_state 112KB 112KB [ 2653.145573] ip_fib_trie 8KB 8KB [ 2653.146179] ip_fib_alias 19KB 19KB [ 2653.146772] ip_dst_cache 40KB 60KB [ 2653.147380] PING 62KB 62KB [ 2653.147984] RAW 93KB 93KB [ 2653.148593] UDP 175KB 315KB [ 2653.149197] tw_sock_TCP 7KB 7KB [ 2653.149793] request_sock_TCP 15KB 15KB [ 2653.150403] TCP 60KB 60KB [ 2653.151008] hugetlbfs_inode_cache 30KB 30KB [ 2653.151641] bio-1 11KB 11KB [ 2653.152258] eventpoll_pwq 23KB 23KB [ 2653.152848] eventpoll_epi 47KB 47KB [ 2653.153456] inotify_inode_mark 46KB 46KB [ 2653.154065] request_queue 60KB 60KB [ 2653.154654] blkdev_ioc 60KB 60KB [ 2653.155239] bio-0 115KB 132KB [ 2653.155833] biovec-max 909KB 922KB [ 2653.156455] biovec-128 63KB 63KB [ 2653.157057] biovec-64 141KB 189KB [ 2653.157651] biovec-16 60KB 60KB [ 2653.158261] user_namespace 31KB 31KB [ 2653.158863] uid_cache 8KB 8KB [ 2653.159465] dmaengine-unmap-2 4KB 4KB [ 2653.160070] audit_buffer 7KB 7KB [ 2653.160678] skbuff_fclone_cache 127KB 127KB [ 2653.161310] skbuff_head_cache 101KB 120KB [ 2653.161899] file_lock_cache 23KB 43KB [ 2653.162509] file_lock_ctx 7KB 7KB [ 2653.163115] fsnotify_mark_connector 24KB 24KB [ 2653.163758] net_namespace 115KB 115KB [ 2653.164375] task_delay_info 146KB 146KB [ 2653.164960] taskstats 84KB 84KB [ 2653.165525] proc_dir_entry 405KB 405KB [ 2653.166101] pde_opener 27KB 27KB [ 2653.166663] seq_file 38KB 52KB [ 2653.167245] sigqueue 110KB 110KB [ 2653.167812] shmem_inode_cache 1215KB 1289KB [ 2653.168398] kernfs_iattrs_cache 231KB 231KB [ 2653.169001] kernfs_node_cache 5420KB 5465KB [ 2653.169567] mnt_cache 194KB 212KB [ 2653.170177] filp 1485KB 2265KB [ 2653.170772] names_cache 11866KB 14666KB [ 2653.171353] hashtab_node 274KB 274KB [ 2653.171933] ebitmap_node 1149KB 1149KB [ 2653.172508] avtab_node 4976KB 4976KB [ 2653.173098] avc_node 35KB 35KB [ 2653.173679] lsm_inode_cache 3265KB 3348KB [ 2653.174271] lsm_file_cache 138KB 196KB [ 2653.174837] key_jar 31KB 31KB [ 2653.175433] uts_namespace 15KB 15KB [ 2653.176016] nsproxy 7KB 7KB [ 2653.176617] vm_area_struct 1258KB 1540KB [ 2653.177206] mm_struct 351KB 378KB [ 2653.177779] fs_cache 55KB 68KB [ 2653.178371] files_cache 198KB 255KB [ 2653.178957] signal_cache 420KB 432KB [ 2653.179529] sighand_cache 339KB 360KB [ 2653.180123] task_struct 1660KB 2178KB [ 2653.180705] cred_jar 146KB 164KB [ 2653.181301] anon_vma_chain 301KB 405KB [ 2653.181877] anon_vma 290KB 290KB [ 2653.182463] pid 52KB 63KB [ 2653.183044] Acpi-Operand 88KB 122KB [ 2653.183622] Acpi-ParseExt 31KB 31KB [ 2653.184210] Acpi-Parse 158KB 173KB [ 2653.184791] Acpi-State 82KB 98KB [ 2653.185371] Acpi-Namespace 24KB 24KB [ 2653.185965] shared_policy_node 4KB 4KB [ 2653.186553] numa_policy 7KB 7KB [ 2653.187152] trace_event_file 163KB 163KB [ 2653.187728] ftrace_event_field 280KB 280KB [ 2653.188343] pool_workqueue 40KB 40KB [ 2653.188932] task_group 16KB 16KB [ 2653.189512] vmap_area 174KB 204KB [ 2653.190106] page->ptl 317KB 374KB [ 2653.190687] kmemleak_scan_area 144KB 167KB [ 2653.191902] kmemleak_object 141378KB 150682KB [ 2653.192526] kmalloc-8k 4800KB 5056KB [ 2653.193133] kmalloc-4k 7360KB 8512KB [ 2653.193725] kmalloc-2k 4616KB 4992KB [ 2653.194326] kmalloc-1k 2338KB 3776KB [ 2653.194941] kmalloc-512 2022KB 3776KB [ 2653.195525] kmalloc-256 1166KB 1296KB [ 2653.196118] kmalloc-192 532KB 544KB [ 2653.196713] kmalloc-128 592KB 600KB [ 2653.197325] kmalloc-96 351KB 680KB [ 2653.197937] kmalloc-64 943KB 1252KB [ 2653.198521] kmalloc-32 896KB 992KB [ 2653.199112] kmalloc-16 376KB 376KB [ 2653.199691] kmalloc-8 308KB 330KB [ 2653.200292] kmem_cache_node 47KB 47KB [ 2653.200867] kmem_cache 75KB 75KB [ 2653.201451] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-timesyncd.service,task=systemd-timesyn,pid=131,uid=101 [ 2653.203989] Out of memory (oom_kill_allocating_task): Killed process 131 (systemd-timesyn) total-vm:88376kB, anon-rss:736kB, file-rss:0kB, shmem-rss:0kB, UID:101 pgtables:76kB oom_score_adj:0 [ 2653.291957] syz-executor.0 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2653.293154] CPU: 0 PID: 286 Comm: syz-executor.0 Not tainted 5.10.184 #1 [ 2653.293895] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2653.294797] Call Trace: [ 2653.295102] dump_stack+0x107/0x167 [ 2653.295503] dump_header+0x106/0x65e [ 2653.295918] oom_kill_process.cold+0x10/0x15 [ 2653.296412] out_of_memory+0x1149/0x1440 [ 2653.296862] ? oom_killer_disable+0x280/0x280 [ 2653.297358] ? mutex_trylock+0x237/0x2b0 [ 2653.297799] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2653.298451] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2653.299101] ? lock_acquire+0xd7/0x470 [ 2653.299523] ? warn_alloc+0x190/0x190 [ 2653.299958] __alloc_pages_nodemask+0x51d/0x600 [ 2653.300478] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2653.301138] ? find_get_entry+0x2c8/0x740 [ 2653.301596] alloc_pages_current+0x187/0x280 [ 2653.302082] __page_cache_alloc+0x2d2/0x360 [ 2653.302548] pagecache_get_page+0x2c7/0xc80 [ 2653.303028] filemap_fault+0x177d/0x2210 [ 2653.303472] ? read_cache_page_gfp+0x30/0x30 [ 2653.303964] ? replace_page_cache_page+0x1200/0x1200 [ 2653.304512] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2653.305098] ext4_filemap_fault+0x87/0xc0 [ 2653.305541] __do_fault+0x113/0x410 [ 2653.305948] handle_mm_fault+0x1e72/0x3520 [ 2653.306415] ? __pmd_alloc+0x5e0/0x5e0 [ 2653.306849] ? vmacache_find+0x55/0x2a0 [ 2653.307287] do_user_addr_fault+0x56e/0xc60 [ 2653.307768] exc_page_fault+0xa2/0x1a0 [ 2653.308189] ? asm_exc_page_fault+0x8/0x30 [ 2653.308673] asm_exc_page_fault+0x1e/0x30 [ 2653.309120] RIP: 0033:0x7f13c2516688 [ 2653.309531] Code: Unable to access opcode bytes at RIP 0x7f13c251665e. [ 2653.310237] RSP: 002b:00007ffe21a3da70 EFLAGS: 00010202 [ 2653.310817] RAX: 0000001b2ce20000 RBX: 000000000000044f RCX: 0000000000287b48 [ 2653.311589] RDX: 0000000000287bf8 RSI: 00007ffe21a3db30 RDI: 0000000000000001 [ 2653.312381] RBP: 00007ffe21a3dacc R08: 0000000000000a5d R09: 00007ffe21b85080 [ 2653.313157] R10: 00007ffe21b85090 R11: 00000000004ba07c R12: 0000000000000032 [ 2653.313941] R13: 000000000028723e R14: 000000000000000b R15: 00007ffe21a3db30 [ 2653.314773] Mem-Info: [ 2653.315070] active_anon:320 inactive_anon:59678 isolated_anon:0 [ 2653.315070] active_file:18 inactive_file:0 isolated_file:0 [ 2653.315070] unevictable:0 dirty:0 writeback:0 [ 2653.315070] slab_reclaimable:8753 slab_unreclaimable:61011 [ 2653.315070] mapped:69648 shmem:105 pagetables:1789 bounce:0 [ 2653.315070] free:3381 free_pcp:7 free_cma:0 [ 2653.318434] Node 0 active_anon:1280kB inactive_anon:238712kB active_file:72kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278592kB dirty:0kB writeback:0kB shmem:420kB writeback_tmp:0kB kernel_stack:4416kB all_unreclaimable? no [ 2653.320907] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2653.323725] lowmem_reserve[]: 0 1616 1616 1616 [ 2653.324260] Node 0 DMA32 free:5464kB min:11260kB low:12912kB high:14564kB reserved_highatomic:2048KB active_anon:1280kB inactive_anon:238880kB active_file:444kB inactive_file:268kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:7156kB bounce:0kB free_pcp:276kB local_pcp:16kB free_cma:0kB [ 2653.327375] lowmem_reserve[]: 0 0 0 0 [ 2653.327812] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 2653.329321] Node 0 DMA32: 581*4kB (UMH) 157*8kB (UMH) 56*16kB (UMEH) 3*32kB (H) 2*64kB (H) 1*128kB (H) 0*256kB 1*512kB (H) 0*1024kB 0*2048kB 0*4096kB = 5340kB [ 2653.330948] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2653.331858] 136 total pagecache pages [ 2653.332286] 0 pages in swap cache [ 2653.332661] Swap cache stats: add 0, delete 0, find 0/0 [ 2653.333255] Free swap = 0kB [ 2653.333584] Total swap = 0kB [ 2653.333932] 524158 pages RAM [ 2653.334266] 0 pages HighMem/MovableOnly [ 2653.334694] 105055 pages reserved [ 2653.335085] Unreclaimable slab info: [ 2653.335488] Name Used Total [ 2653.336094] pid_3 7KB 7KB [ 2653.336678] pid_2 93KB 93KB [ 2653.337266] IEEE-802.15.4-MAC 63KB 63KB [ 2653.337839] IEEE-802.15.4-RAW 31KB 31KB [ 2653.338419] p9_req_t 8KB 8KB [ 2653.339014] ip6-frags 15KB 15KB [ 2653.339583] fib6_nodes 28KB 28KB [ 2653.340161] ip6_dst_cache 37KB 37KB [ 2653.340765] PINGv6 63KB 63KB [ 2653.341355] RAWv6 378KB 378KB [ 2653.341950] UDPLITEv6 62KB 62KB [ 2653.342534] UDPv6 62KB 62KB [ 2653.343126] tw_sock_TCPv6 15KB 15KB [ 2653.343702] request_sock_TCPv6 15KB 15KB [ 2653.344296] TCPv6 62KB 62KB [ 2653.344870] scsi_sense_cache 8KB 8KB [ 2653.345456] sd_ext_cdb 3KB 3KB [ 2653.346036] virtio_scsi_cmd 16KB 16KB [ 2653.346607] sgpool-128 59KB 59KB [ 2653.347186] sgpool-64 63KB 63KB [ 2653.347757] sgpool-32 63KB 63KB [ 2653.348352] sgpool-16 82KB 82KB [ 2653.348941] sgpool-8 63KB 63KB [ 2653.349519] io_kiocb 45KB 60KB [ 2653.350112] mqueue_inode_cache 62KB 62KB [ 2653.350697] nfs_commit_data 15KB 15KB [ 2653.351280] nfs_write_data 47KB 47KB [ 2653.351853] jbd2_inode 7KB 7KB [ 2653.352442] ext4_system_zone 7KB 7KB [ 2653.353029] ext4_io_end_vec 7KB 7KB [ 2653.353600] ext4_bio_post_read_ctx 15KB 15KB [ 2653.354234] kioctx 31KB 31KB [ 2653.354807] aio_kiocb 7KB 7KB [ 2653.355396] dio 30KB 30KB [ 2653.355981] bio-2 4KB 4KB [ 2653.356558] fasync_cache 7KB 7KB [ 2653.357140] pid_namespace 7KB 7KB [ 2653.357714] posix_timers_cache 15KB 15KB [ 2653.358312] rpc_buffers 31KB 31KB [ 2653.358883] rpc_tasks 3KB 3KB [ 2653.359464] UNIX 264KB 352KB [ 2653.360045] UDP-Lite 31KB 31KB [ 2653.360625] tcp_bind_bucket 8KB 8KB [ 2653.361211] xfrm_state 112KB 112KB [ 2653.361791] ip_fib_trie 8KB 8KB [ 2653.362378] ip_fib_alias 19KB 19KB [ 2653.362967] ip_dst_cache 40KB 60KB [ 2653.363542] PING 62KB 62KB [ 2653.364130] RAW 93KB 93KB [ 2653.364719] UDP 175KB 315KB [ 2653.365299] tw_sock_TCP 7KB 7KB [ 2653.365868] request_sock_TCP 15KB 15KB [ 2653.366448] TCP 60KB 60KB [ 2653.367033] hugetlbfs_inode_cache 30KB 30KB [ 2653.367639] bio-1 11KB 11KB [ 2653.368228] eventpoll_pwq 23KB 23KB [ 2653.368804] eventpoll_epi 47KB 47KB [ 2653.369388] inotify_inode_mark 46KB 46KB [ 2653.369984] request_queue 60KB 60KB [ 2653.370552] blkdev_ioc 60KB 60KB [ 2653.371145] bio-0 115KB 128KB [ 2653.371712] biovec-max 824KB 922KB [ 2653.372309] biovec-128 63KB 63KB [ 2653.372872] biovec-64 141KB 189KB [ 2653.373463] biovec-16 60KB 60KB [ 2653.374041] user_namespace 31KB 31KB [ 2653.374616] uid_cache 8KB 8KB [ 2653.375201] dmaengine-unmap-2 4KB 4KB [ 2653.375776] audit_buffer 7KB 7KB [ 2653.376372] skbuff_fclone_cache 127KB 127KB [ 2653.376987] skbuff_head_cache 100KB 116KB [ 2653.377560] file_lock_cache 23KB 43KB [ 2653.378148] file_lock_ctx 7KB 7KB [ 2653.378721] fsnotify_mark_connector 24KB 24KB [ 2653.379357] net_namespace 115KB 115KB [ 2653.379949] task_delay_info 146KB 146KB [ 2653.380537] taskstats 84KB 84KB [ 2653.381118] proc_dir_entry 405KB 405KB [ 2653.381690] pde_opener 27KB 27KB [ 2653.382268] seq_file 38KB 52KB [ 2653.382846] sigqueue 110KB 110KB [ 2653.383430] shmem_inode_cache 1214KB 1289KB [ 2653.384008] kernfs_iattrs_cache 231KB 231KB [ 2653.384613] kernfs_node_cache 5420KB 5465KB [ 2653.385205] mnt_cache 194KB 212KB [ 2653.385805] filp 1461KB 2242KB [ 2653.386417] names_cache 11305KB 13923KB [ 2653.387001] hashtab_node 274KB 274KB [ 2653.387578] ebitmap_node 1149KB 1149KB [ 2653.388152] avtab_node 4976KB 4976KB [ 2653.388743] avc_node 35KB 35KB [ 2653.389333] lsm_inode_cache 3261KB 3348KB [ 2653.389903] lsm_file_cache 138KB 196KB [ 2653.390482] key_jar 31KB 31KB [ 2653.391066] uts_namespace 15KB 15KB [ 2653.391632] nsproxy 7KB 7KB [ 2653.392247] vm_area_struct 1209KB 1512KB [ 2653.392819] mm_struct 351KB 378KB [ 2653.393399] fs_cache 55KB 68KB [ 2653.393984] files_cache 198KB 255KB [ 2653.394547] signal_cache 420KB 432KB [ 2653.395132] sighand_cache 339KB 360KB [ 2653.395703] task_struct 1614KB 2152KB [ 2653.396292] cred_jar 146KB 164KB [ 2653.396869] anon_vma_chain 289KB 397KB [ 2653.397450] anon_vma 290KB 290KB [ 2653.398035] pid 52KB 63KB [ 2653.398599] Acpi-Operand 88KB 122KB [ 2653.399182] Acpi-ParseExt 31KB 31KB [ 2653.399758] Acpi-Parse 158KB 173KB [ 2653.400354] Acpi-State 82KB 98KB [ 2653.400943] Acpi-Namespace 24KB 24KB [ 2653.401517] shared_policy_node 4KB 4KB [ 2653.402106] numa_policy 7KB 7KB [ 2653.402677] trace_event_file 163KB 163KB [ 2653.403263] ftrace_event_field 280KB 280KB [ 2653.403843] pool_workqueue 40KB 40KB [ 2653.404432] task_group 16KB 16KB [ 2653.405011] vmap_area 174KB 204KB [ 2653.405584] page->ptl 316KB 374KB [ 2653.406166] kmemleak_scan_area 144KB 167KB [ 2653.407231] kmemleak_object 140574KB 150675KB [ 2653.407812] kmalloc-8k 4800KB 5056KB [ 2653.408415] kmalloc-4k 7280KB 8480KB [ 2653.409009] kmalloc-2k 4592KB 4992KB [ 2653.409601] kmalloc-1k 2338KB 3776KB [ 2653.410211] kmalloc-512 1981KB 3776KB [ 2653.410792] kmalloc-256 1164KB 1296KB [ 2653.411373] kmalloc-192 532KB 544KB [ 2653.411955] kmalloc-128 584KB 600KB [ 2653.412554] kmalloc-96 351KB 680KB [ 2653.413163] kmalloc-64 938KB 1252KB [ 2653.413744] kmalloc-32 895KB 992KB [ 2653.414338] kmalloc-16 376KB 376KB [ 2653.414907] kmalloc-8 308KB 330KB [ 2653.415494] kmem_cache_node 47KB 47KB [ 2653.416081] kmem_cache 75KB 75KB [ 2653.416669] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0,global_oom,task_memcg=/syz0,task=syz-executor.0,pid=286,uid=0 [ 2653.418210] Out of memory (oom_kill_allocating_task): Killed process 286 (syz-executor.0) total-vm:93280kB, anon-rss:384kB, file-rss:34812kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:0 [ 2653.426018] in:imklog invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2653.427112] CPU: 0 PID: 178 Comm: in:imklog Not tainted 5.10.184 #1 [ 2653.427781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2653.428721] Call Trace: [ 2653.429018] dump_stack+0x107/0x167 [ 2653.429440] dump_header+0x106/0x65e [ 2653.429863] oom_kill_process.cold+0x10/0x15 [ 2653.430363] out_of_memory+0x1149/0x1440 [ 2653.430824] ? oom_killer_disable+0x280/0x280 [ 2653.431309] ? mutex_trylock+0x237/0x2b0 [ 2653.431767] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2653.432420] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2653.433085] ? lock_acquire+0xd7/0x470 [ 2653.433508] ? warn_alloc+0x190/0x190 [ 2653.433950] __alloc_pages_nodemask+0x51d/0x600 [ 2653.434458] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2653.435132] ? find_get_entry+0x2c8/0x740 [ 2653.435604] alloc_pages_current+0x187/0x280 [ 2653.436080] __page_cache_alloc+0x2d2/0x360 [ 2653.436589] pagecache_get_page+0x2c7/0xc80 [ 2653.437084] filemap_fault+0x177d/0x2210 [ 2653.437527] ? read_cache_page_gfp+0x30/0x30 [ 2653.438019] ? replace_page_cache_page+0x1200/0x1200 [ 2653.438564] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2653.439152] ext4_filemap_fault+0x87/0xc0 [ 2653.439609] __do_fault+0x113/0x410 [ 2653.440034] handle_mm_fault+0x1e72/0x3520 [ 2653.440513] ? fsnotify+0xf50/0xf50 [ 2653.440922] ? __pmd_alloc+0x5e0/0x5e0 [ 2653.441365] ? vmacache_find+0x55/0x2a0 [ 2653.441805] ? vmacache_update+0xce/0x140 [ 2653.442269] do_user_addr_fault+0x56e/0xc60 [ 2653.442760] exc_page_fault+0xa2/0x1a0 [ 2653.443203] ? asm_exc_page_fault+0x8/0x30 [ 2653.443679] asm_exc_page_fault+0x1e/0x30 [ 2653.444144] RIP: 0033:0x7feb34a2908c [ 2653.444572] Code: Unable to access opcode bytes at RIP 0x7feb34a29062. [ 2653.445309] RSP: 002b:00007feb33fc54d0 EFLAGS: 00010246 [ 2653.445909] RAX: 0000000000000b24 RBX: 0000000000000000 RCX: 00007feb34a2908c [ 2653.446710] RDX: 0000000000001fa0 RSI: 00007feb33fc5d00 RDI: 0000000000000005 [ 2653.447520] RBP: 000056048ec194c0 R08: 0000000000000000 R09: 000056048ec15e88 [ 2653.448337] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb33fc5d00 [ 2653.449131] R13: 0000000000001fa0 R14: 00007feb33fc5d00 R15: 00007feb33fc5d5b [ 2653.449984] Mem-Info: [ 2653.450271] active_anon:320 inactive_anon:59678 isolated_anon:0 [ 2653.450271] active_file:18 inactive_file:0 isolated_file:0 [ 2653.450271] unevictable:0 dirty:0 writeback:0 [ 2653.450271] slab_reclaimable:8753 slab_unreclaimable:61011 [ 2653.450271] mapped:69648 shmem:105 pagetables:1789 bounce:0 [ 2653.450271] free:2861 free_pcp:0 free_cma:0 [ 2653.453709] Node 0 active_anon:1280kB inactive_anon:238712kB active_file:72kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278592kB dirty:0kB writeback:0kB shmem:420kB writeback_tmp:0kB kernel_stack:4384kB all_unreclaimable? no [ 2653.456273] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2653.459156] lowmem_reserve[]: 0 1616 1616 1616 [ 2653.459691] Node 0 DMA32 free:4960kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:1280kB inactive_anon:238880kB active_file:444kB inactive_file:268kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:7156kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2653.462874] lowmem_reserve[]: 0 0 0 0 [ 2653.463329] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 2653.464857] Node 0 DMA32: 582*4kB (UMH) 159*8kB (UMH) 56*16kB (UMH) 4*32kB (UH) 2*64kB (H) 1*128kB (H) 0*256kB 1*512kB (H) 0*1024kB 0*2048kB 0*4096kB = 5392kB [ 2653.466557] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2653.467503] 136 total pagecache pages [ 2653.467941] 0 pages in swap cache [ 2653.468345] Swap cache stats: add 0, delete 0, find 0/0 [ 2653.468950] Free swap = 0kB [ 2653.469287] Total swap = 0kB [ 2653.469620] 524158 pages RAM [ 2653.469974] 0 pages HighMem/MovableOnly [ 2653.470413] 105055 pages reserved [ 2653.470794] Unreclaimable slab info: [ 2653.471221] Name Used Total [ 2653.471831] pid_3 7KB 7KB [ 2653.472422] pid_2 93KB 93KB [ 2653.473023] IEEE-802.15.4-MAC 63KB 63KB [ 2653.473614] IEEE-802.15.4-RAW 31KB 31KB [ 2653.474220] p9_req_t 8KB 8KB [ 2653.474806] ip6-frags 15KB 15KB [ 2653.475390] fib6_nodes 28KB 28KB [ 2653.476003] ip6_dst_cache 37KB 37KB [ 2653.476602] PINGv6 63KB 63KB [ 2653.477202] RAWv6 378KB 378KB [ 2653.477791] UDPLITEv6 62KB 62KB [ 2653.478394] UDPv6 62KB 62KB [ 2653.478995] tw_sock_TCPv6 15KB 15KB [ 2653.479583] request_sock_TCPv6 15KB 15KB [ 2653.480178] TCPv6 62KB 62KB [ 2653.480790] scsi_sense_cache 8KB 8KB [ 2653.481389] sd_ext_cdb 3KB 3KB [ 2653.481995] virtio_scsi_cmd 16KB 16KB [ 2653.482592] sgpool-128 59KB 59KB [ 2653.483174] sgpool-64 63KB 63KB [ 2653.483763] sgpool-32 63KB 63KB [ 2653.484356] sgpool-16 82KB 82KB [ 2653.484960] sgpool-8 63KB 63KB [ 2653.485552] io_kiocb 45KB 60KB [ 2653.486159] mqueue_inode_cache 62KB 62KB [ 2653.486759] nfs_commit_data 15KB 15KB [ 2653.487368] nfs_write_data 47KB 47KB [ 2653.487973] jbd2_inode 7KB 7KB [ 2653.488569] ext4_system_zone 7KB 7KB [ 2653.489156] ext4_io_end_vec 7KB 7KB [ 2653.489750] ext4_bio_post_read_ctx 15KB 15KB [ 2653.490405] kioctx 31KB 31KB [ 2653.491002] aio_kiocb 7KB 7KB [ 2653.491593] dio 30KB 30KB [ 2653.492193] bio-2 4KB 4KB [ 2653.492800] fasync_cache 7KB 7KB [ 2653.493392] pid_namespace 7KB 7KB [ 2653.494000] posix_timers_cache 15KB 15KB [ 2653.494597] rpc_buffers 31KB 31KB [ 2653.495200] rpc_tasks 3KB 3KB [ 2653.495790] UNIX 264KB 352KB [ 2653.496391] UDP-Lite 31KB 31KB [ 2653.496989] tcp_bind_bucket 8KB 8KB [ 2653.497587] xfrm_state 112KB 112KB [ 2653.498192] ip_fib_trie 8KB 8KB [ 2653.498785] ip_fib_alias 19KB 19KB [ 2653.499389] ip_dst_cache 40KB 60KB [ 2653.499990] PING 62KB 62KB [ 2653.500598] RAW 93KB 93KB [ 2653.501197] UDP 175KB 315KB [ 2653.501785] tw_sock_TCP 7KB 7KB [ 2653.502389] request_sock_TCP 15KB 15KB [ 2653.502987] TCP 60KB 60KB [ 2653.503582] hugetlbfs_inode_cache 30KB 30KB [ 2653.504237] bio-1 11KB 11KB [ 2653.504827] eventpoll_pwq 23KB 23KB [ 2653.505435] eventpoll_epi 47KB 47KB [ 2653.506049] inotify_inode_mark 46KB 46KB [ 2653.506652] request_queue 60KB 60KB [ 2653.507259] blkdev_ioc 60KB 60KB [ 2653.507851] bio-0 115KB 128KB [ 2653.508462] biovec-max 824KB 922KB [ 2653.509064] biovec-128 63KB 63KB [ 2653.509662] biovec-64 141KB 189KB [ 2653.510275] biovec-16 60KB 60KB [ 2653.510868] user_namespace 31KB 31KB [ 2653.511474] uid_cache 8KB 8KB [ 2653.512088] dmaengine-unmap-2 4KB 4KB [ 2653.512691] audit_buffer 7KB 7KB [ 2653.513294] skbuff_fclone_cache 127KB 127KB [ 2653.513907] skbuff_head_cache 100KB 116KB [ 2653.514513] file_lock_cache 23KB 43KB [ 2653.515128] file_lock_ctx 7KB 7KB [ 2653.515718] fsnotify_mark_connector 24KB 24KB [ 2653.516395] net_namespace 115KB 115KB [ 2653.516998] task_delay_info 146KB 146KB [ 2653.517591] taskstats 84KB 84KB [ 2653.518198] proc_dir_entry 405KB 405KB [ 2653.518787] pde_opener 27KB 27KB [ 2653.519402] seq_file 38KB 52KB [ 2653.520008] sigqueue 110KB 110KB [ 2653.520618] shmem_inode_cache 1214KB 1289KB [ 2653.521228] kernfs_iattrs_cache 231KB 231KB [ 2653.521840] kernfs_node_cache 5420KB 5465KB [ 2653.522441] mnt_cache 194KB 212KB [ 2653.523052] filp 1461KB 2242KB [ 2653.523650] names_cache 11305KB 13923KB [ 2653.524271] hashtab_node 274KB 274KB [ 2653.524857] ebitmap_node 1149KB 1149KB [ 2653.525467] avtab_node 4976KB 4976KB [ 2653.526072] avc_node 35KB 35KB [ 2653.526664] lsm_inode_cache 3261KB 3348KB [ 2653.527267] lsm_file_cache 138KB 196KB [ 2653.527863] key_jar 31KB 31KB [ 2653.528476] uts_namespace 15KB 15KB [ 2653.529077] nsproxy 7KB 7KB [ 2653.529675] vm_area_struct 1209KB 1512KB [ 2653.530286] mm_struct 351KB 378KB [ 2653.530885] fs_cache 55KB 68KB [ 2653.531485] files_cache 198KB 255KB [ 2653.532093] signal_cache 420KB 432KB [ 2653.532697] sighand_cache 339KB 360KB [ 2653.533304] task_struct 1614KB 2152KB [ 2653.533899] cred_jar 146KB 164KB [ 2653.534510] anon_vma_chain 289KB 397KB [ 2653.535112] anon_vma 290KB 290KB [ 2653.535702] pid 52KB 63KB [ 2653.536322] Acpi-Operand 88KB 122KB [ 2653.536931] Acpi-ParseExt 31KB 31KB [ 2653.537520] Acpi-Parse 158KB 173KB [ 2653.538135] Acpi-State 82KB 98KB [ 2653.538734] Acpi-Namespace 24KB 24KB [ 2653.539344] shared_policy_node 4KB 4KB [ 2653.539952] numa_policy 7KB 7KB [ 2653.540555] trace_event_file 163KB 163KB [ 2653.541162] ftrace_event_field 280KB 280KB [ 2653.541754] pool_workqueue 40KB 40KB [ 2653.542369] task_group 16KB 16KB [ 2653.542976] vmap_area 174KB 204KB [ 2653.543570] page->ptl 316KB 374KB [ 2653.544177] kmemleak_scan_area 144KB 167KB [ 2653.544854] kmemleak_object 140574KB 150675KB [ 2653.545467] kmalloc-8k 4800KB 5056KB [ 2653.546070] kmalloc-4k 7280KB 8480KB [ 2653.546660] kmalloc-2k 4592KB 4992KB [ 2653.547272] kmalloc-1k 2338KB 3776KB [ 2653.547860] kmalloc-512 1981KB 3776KB [ 2653.548483] kmalloc-256 1164KB 1296KB [ 2653.549100] kmalloc-192 532KB 544KB [ 2653.549695] kmalloc-128 584KB 600KB [ 2653.550308] kmalloc-96 351KB 680KB [ 2653.550897] kmalloc-64 938KB 1252KB [ 2653.551496] kmalloc-32 895KB 992KB [ 2653.552097] kmalloc-16 376KB 376KB [ 2653.552707] kmalloc-8 308KB 330KB [ 2653.553308] kmem_cache_node 47KB 47KB [ 2653.553461] syz-executor.7: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null) [ 2653.553888] kmem_cache 75KB 75KB [ 2653.553961] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null) [ 2653.556326] ,cpuset= [ 2653.556808] ,cpuset=/,mems_allowed=0,global_oom,task_memcg= [ 2653.558874] syz7 [ 2653.560389] /system.slice/rsyslog.service [ 2653.560433] ,mems_allowed=0 [ 2653.560635] ,task=in:imklog,pid=178,uid=0 [ 2653.561511] [ 2653.561998] Out of memory (oom_kill_allocating_task): Killed process 174 (rsyslogd) total-vm:220876kB, anon-rss:740kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:0 [ 2653.562745] CPU: 1 PID: 13589 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 2653.567742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2653.569512] Call Trace: [ 2653.570080] dump_stack+0x107/0x167 [ 2653.570863] warn_alloc.cold+0x95/0x18a [ 2653.571719] ? zone_watermark_ok_safe+0x260/0x260 [ 2653.572755] ? schedule_timeout+0x1ce/0x380 [ 2653.573674] ? usleep_range+0x170/0x170 [ 2653.574526] ? __next_timer_interrupt+0x2c0/0x2c0 [ 2653.575584] __alloc_pages_slowpath.constprop.0+0x1c80/0x2130 [ 2653.576864] ? lock_acquire+0xd7/0x470 [ 2653.577708] ? warn_alloc+0x190/0x190 [ 2653.578556] __alloc_pages_nodemask+0x51d/0x600 [ 2653.579557] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2653.580718] ? trace_hardirqs_on+0x5b/0x180 [ 2653.581644] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2653.582924] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2653.584085] ? alloc_pages_current+0x9a/0x280 [ 2653.585060] alloc_pages_current+0x187/0x280 [ 2653.586004] relay_open_buf.part.0+0x2a5/0xc00 [ 2653.586991] relay_open+0x531/0xa10 [ 2653.587777] do_blk_trace_setup+0x4cf/0xc10 [ 2653.588704] ? _copy_from_user+0xfb/0x1b0 [ 2653.589588] __blk_trace_setup+0xca/0x180 [ 2653.590471] ? do_blk_trace_setup+0xc10/0xc10 [ 2653.591441] ? perf_trace_lock+0xac/0x490 [ 2653.592338] ? SOFTIRQ_verbose+0x10/0x10 [ 2653.593213] blk_trace_setup+0x43/0x60 [ 2653.594049] sg_ioctl_common+0x634/0x2570 [ 2653.594935] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2653.596035] ? do_vfs_ioctl+0x283/0x10d0 [ 2653.596908] ? sg_write+0x120/0x120 [ 2653.597691] ? generic_block_fiemap+0x60/0x60 [ 2653.598655] ? __fget_files+0x255/0x4c0 [ 2653.599516] ? selinux_file_ioctl+0xb6/0x270 [ 2653.600461] ? sg_compat_ioctl+0x120/0x120 [ 2653.601363] sg_ioctl+0x8f/0x120 [ 2653.602089] __x64_sys_ioctl+0x19a/0x210 [ 2653.602959] do_syscall_64+0x33/0x40 [ 2653.603753] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2653.604850] RIP: 0033:0x7f1ac5591b19 [ 2653.605640] Code: Unable to access opcode bytes at RIP 0x7f1ac5591aef. [ 2653.607029] RSP: 002b:00007f1ac2b07188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2653.608661] RAX: ffffffffffffffda RBX: 00007f1ac56a4f60 RCX: 00007f1ac5591b19 [ 2653.610177] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 2653.611696] RBP: 00007f1ac55ebf6d R08: 0000000000000000 R09: 0000000000000000 [ 2653.613224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2653.614745] R13: 00007ffd3b2574cf R14: 00007f1ac2b07300 R15: 0000000000022000 [ 2653.616348] Mem-Info: [ 2653.616899] active_anon:320 inactive_anon:59678 isolated_anon:0 [ 2653.616899] active_file:18 inactive_file:0 isolated_file:0 [ 2653.616899] unevictable:0 dirty:0 writeback:0 [ 2653.616899] slab_reclaimable:8753 slab_unreclaimable:61011 [ 2653.616899] mapped:69648 shmem:105 pagetables:1789 bounce:0 [ 2653.616899] free:2674 free_pcp:62 free_cma:0 [ 2653.623483] Node 0 active_anon:1280kB inactive_anon:238712kB active_file:72kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278592kB dirty:0kB writeback:0kB shmem:420kB writeback_tmp:0kB kernel_stack:4384kB all_unreclaimable? yes [ 2653.628338] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2653.633849] lowmem_reserve[]: 0 1616 1616 1616 [ 2653.634902] Node 0 DMA32 free:4212kB min:13308kB low:14960kB high:16612kB reserved_highatomic:2048KB active_anon:1280kB inactive_anon:238880kB active_file:316kB inactive_file:68kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:7156kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 2653.641119] lowmem_reserve[]: 0 0 0 0 [ 2653.642003] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 2653.644920] Node 0 DMA32: 436*4kB (UMH) 126*8kB (UMH) 48*16kB (UMH) 3*32kB (H) 2*64kB (H) 1*128kB (H) 0*256kB 1*512kB (H) 0*1024kB 0*2048kB 0*4096kB = 4384kB [ 2653.648146] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2653.649982] 136 total pagecache pages [ 2653.650786] 0 pages in swap cache [ 2653.651556] Swap cache stats: add 0, delete 0, find 0/0 [ 2653.652725] Free swap = 0kB [ 2653.653402] Total swap = 0kB [ 2653.654073] 524158 pages RAM [ 2653.654718] 0 pages HighMem/MovableOnly [ 2653.655588] 105055 pages reserved [ 2653.895351] blktrace: Concurrent blktraces are not allowed on sg0 04:09:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:09:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x68, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:09:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 04:09:41 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x2}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:09:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60015f03100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2666.442083] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:09:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:09:41 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) 04:09:41 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x600000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2666.472824] blktrace: Concurrent blktraces are not allowed on sg0 04:09:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 2666.504452] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:09:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2a010000}, 0x0) 04:09:41 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x3}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:09:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010005100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2666.545323] blktrace: Concurrent blktraces are not allowed on sg0 04:09:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 04:09:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:09:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010006100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:09:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x45030000}, 0x0) [ 2666.722671] blktrace: Concurrent blktraces are not allowed on sg0 [ 2666.733434] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:09:41 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) [ 2666.773409] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2676.306840] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2676.309118] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2676.311869] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2676.357986] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2676.359979] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2676.362800] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 04:10:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010007100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:10:07 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x6c, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:10:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:10:07 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x4}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:10:07 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x700000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:10:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 04:10:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:10:07 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) [ 2692.288294] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:10:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xe4010000}, 0x0) [ 2692.318725] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:10:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010009100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2692.387361] blktrace: Concurrent blktraces are not allowed on sg0 04:10:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 04:10:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:10:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) 04:10:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="6001000a100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:10:07 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) [ 2692.497303] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:10:07 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x74, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:10:07 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x5}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:10:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:10:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:10:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) [ 2692.716398] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2692.742906] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2692.782741] blktrace: Concurrent blktraces are not allowed on sg0 04:10:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:10:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="6001000b100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:10:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x7a, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:10:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 04:10:20 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) readv(r0, &(0x7f0000001300), 0x0) 04:10:20 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x2b17000000000000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:10:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4201000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:10:20 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x6}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) [ 2705.345382] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2705.386495] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2705.392454] blktrace: Concurrent blktraces are not allowed on sg0 [ 2705.395511] blktrace: Concurrent blktraces are not allowed on sg0 04:10:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="6001000f100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:10:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 04:10:20 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) readv(r0, &(0x7f0000001300), 0x0) 04:10:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010011100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:10:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4301000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:10:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:10:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 04:10:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="6001035f100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:10:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x142, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:10:32 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x8}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:10:32 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000005c0)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{}, {0x0, 0x0, 0x0, 0x0, 0x101}]}) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x10100, 0x0) ioctl$BTRFS_IOC_RM_DEV(r3, 0x5000940b, &(0x7f0000000680)={{r4}, "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"}) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r5 = accept(r2, &(0x7f00000001c0)=@rc={0x1f, @none}, &(0x7f0000000140)=0x80) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00'}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r6 = gettid() rt_sigqueueinfo(r6, 0x7, &(0x7f0000000600)) 04:10:32 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) readv(r0, &(0x7f0000001300), 0x0) 04:10:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2717.314854] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:10:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="600100f0100001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2717.364712] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:10:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000030001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:10:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) 04:10:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2717.509094] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=3 sclass=netlink_xfrm_socket pid=14297 comm=syz-executor.3 04:10:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2717.564362] blktrace: Concurrent blktraces are not allowed on sg0 [ 2717.569501] blktrace: Concurrent blktraces are not allowed on sg0 04:10:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000050001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2717.604768] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:10:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 04:10:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x144, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2717.684163] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5 sclass=netlink_xfrm_socket pid=14308 comm=syz-executor.3 04:10:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:10:32 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x14}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:10:32 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) 04:10:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}}, 0x2) [ 2717.788485] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:10:32 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x20500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000005c0)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{}, {0x0, 0x0, 0x0, 0x0, 0x101}]}) sendfile(r1, r3, &(0x7f0000000140)=0x7, 0x8) [ 2717.815648] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:10:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000060001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) [ 2717.847702] blktrace: Concurrent blktraces are not allowed on sg0 04:10:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2717.933039] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=6 sclass=netlink_xfrm_socket pid=14336 comm=syz-executor.3 [ 2717.960191] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:10:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}}, 0x3) [ 2718.009702] blktrace: Concurrent blktraces are not allowed on sg0 [ 2718.026114] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:10:45 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) 04:10:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:10:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}}, 0x8) [ 2730.976840] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2730.992491] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=7 sclass=netlink_xfrm_socket pid=14357 comm=syz-executor.3 [ 2730.998632] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:10:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x164, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) 04:10:45 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x5f}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:10:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:10:45 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000140)=ANY=[@ANYBLOB="af55ca86e5493b2c52d4f1ef3c19f5798c2af4958100"/36]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:10:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000070001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:10:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:10:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000090001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:10:45 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0x5385, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) 04:10:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}}, 0x9) [ 2731.126228] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=9 sclass=netlink_xfrm_socket pid=14377 comm=syz-executor.3 [ 2731.134375] blktrace: Concurrent blktraces are not allowed on sg0 [ 2731.136893] blktrace: Concurrent blktraces are not allowed on sg0 [ 2731.153516] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities 04:11:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:11:00 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x80000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x0) readv(r0, &(0x7f0000001300), 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x7, &(0x7f0000000600)) 04:11:00 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000005c0)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{}, {0x0, 0x0, 0x0, 0x0, 0x101}]}) r1 = fcntl$dupfd(r0, 0x0, r0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d400000000"]) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r1, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r3 = gettid() rt_sigqueueinfo(r3, 0x7, &(0x7f0000000600)) 04:11:00 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(r0, &(0x7f0000001300), 0x0) 04:11:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="600100000a0001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:11:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}}, 0xa) 04:11:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:11:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x700, 0x408, 0x7}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="af5571373953bf3c4a59b100000000d4000000"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, &(0x7f0000001300), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x7, &(0x7f0000000600)) [ 2745.628105] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2745.628226] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=10 sclass=netlink_xfrm_socket pid=14405 comm=syz-executor.3 04:11:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="600100000b0001000000000001000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000a01010200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000002001000040"], 0x160}}, 0x0) 04:11:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}}, 0xf) 04:11:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) [ 2745.769172] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=11 sclass=netlink_xfrm_socket pid=14418 comm=syz-executor.3 04:11:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) 04:11:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}]}, 0x1c}}, 0xf0) [ 2745.889131] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2745.911541] EXT4-fs (loop6): couldn't mount as ext2 due to feature incompatibilities [ 2746.994846] syz-executor.5 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2746.997042] CPU: 1 PID: 292 Comm: syz-executor.5 Not tainted 5.10.184 #1 [ 2746.998394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2747.000052] Call Trace: [ 2747.000585] dump_stack+0x107/0x167 [ 2747.001321] dump_header+0x106/0x65e [ 2747.002094] oom_kill_process.cold+0x10/0x15 [ 2747.002981] out_of_memory+0x1149/0x1440 [ 2747.003803] ? oom_killer_disable+0x280/0x280 [ 2747.004927] ? mutex_trylock+0x237/0x2b0 [ 2747.005872] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2747.007482] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2747.008878] ? lock_acquire+0xd7/0x470 [ 2747.009959] ? warn_alloc+0x190/0x190 [ 2747.010890] __alloc_pages_nodemask+0x51d/0x600 [ 2747.012147] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2747.013557] ? find_get_entry+0x2c8/0x740 [ 2747.014662] alloc_pages_current+0x187/0x280 [ 2747.015643] __page_cache_alloc+0x2d2/0x360 [ 2747.016606] pagecache_get_page+0x2c7/0xc80 [ 2747.017600] filemap_fault+0x177d/0x2210 [ 2747.018501] ? read_cache_page_gfp+0x30/0x30 [ 2747.019376] ? replace_page_cache_page+0x1200/0x1200 [ 2747.020388] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2747.021451] ext4_filemap_fault+0x87/0xc0 [ 2747.022276] __do_fault+0x113/0x410 [ 2747.023006] handle_mm_fault+0x1e72/0x3520 [ 2747.023859] ? __pmd_alloc+0x5e0/0x5e0 [ 2747.024646] ? vmacache_find+0x55/0x2a0 [ 2747.025460] do_user_addr_fault+0x56e/0xc60 [ 2747.026331] exc_page_fault+0xa2/0x1a0 [ 2747.027187] ? asm_exc_page_fault+0x8/0x30 [ 2747.028124] asm_exc_page_fault+0x1e/0x30 [ 2747.029030] RIP: 0033:0x7fc36ec7d688 [ 2747.029871] Code: Unable to access opcode bytes at RIP 0x7fc36ec7d65e. [ 2747.031312] RSP: 002b:00007ffe4915af50 EFLAGS: 00010206 [ 2747.032487] RAX: 0000001b2d720000 RBX: 000000000000046d RCX: 000000000029e690 [ 2747.034055] RDX: 000000000029e9cc RSI: 00007ffe4915b010 RDI: 0000000000000001 [ 2747.035621] RBP: 00007ffe4915afac R08: 0000000000000aba R09: 00007ffe4915f080 [ 2747.037189] R10: 00007ffe4915f090 R11: 00000000004e43f4 R12: 0000000000000032 [ 2747.038773] R13: 000000000029e7d5 R14: 000000000000000f R15: 00007ffe4915b010 [ 2747.040657] Mem-Info: [ 2747.041299] active_anon:510 inactive_anon:55899 isolated_anon:4 [ 2747.041299] active_file:18 inactive_file:37 isolated_file:0 [ 2747.041299] unevictable:0 dirty:0 writeback:0 [ 2747.041299] slab_reclaimable:6873 slab_unreclaimable:64135 [ 2747.041299] mapped:69649 shmem:102 pagetables:1661 bounce:0 [ 2747.041299] free:2801 free_pcp:0 free_cma:0 [ 2747.048146] Node 0 active_anon:2040kB inactive_anon:223596kB active_file:32kB inactive_file:92kB unevictable:0kB isolated(anon):16kB isolated(file):12kB mapped:278564kB dirty:0kB writeback:0kB shmem:408kB writeback_tmp:0kB kernel_stack:4544kB all_unreclaimable? no [ 2747.053244] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:12kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2747.059121] lowmem_reserve[]: 0 1616 1616 1616 [ 2747.060268] Node 0 DMA32 free:5292kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:2040kB inactive_anon:223668kB active_file:60kB inactive_file:172kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:6644kB bounce:0kB free_pcp:16kB local_pcp:0kB free_cma:0kB [ 2747.066844] lowmem_reserve[]: 0 0 0 0 [ 2747.067803] Node 0 DMA: 2*4kB (UM) 0*8kB 1*16kB (M) 2*32kB (UM) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6488kB [ 2747.071358] Node 0 DMA32: 458*4kB (UM) 83*8kB (UM) 17*16kB (UMH) 21*32kB (UH) 1*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 5424kB [ 2747.074995] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2747.076996] 140 total pagecache pages [ 2747.077902] 0 pages in swap cache [ 2747.078751] Swap cache stats: add 0, delete 0, find 0/0 [ 2747.080014] Free swap = 0kB [ 2747.080737] Total swap = 0kB [ 2747.081496] 524158 pages RAM [ 2747.082244] 0 pages HighMem/MovableOnly [ 2747.083207] 105055 pages reserved [ 2747.084039] Unreclaimable slab info: [ 2747.084858] Name Used Total [ 2747.086015] pid_3 7KB 7KB [ 2747.087121] pid_2 93KB 93KB [ 2747.088213] IEEE-802.15.4-MAC 63KB 63KB [ 2747.089339] IEEE-802.15.4-RAW 31KB 31KB [ 2747.090492] p9_req_t 8KB 8KB [ 2747.091624] ip6-frags 15KB 15KB [ 2747.092749] fib6_nodes 28KB 28KB [ 2747.093904] ip6_dst_cache 37KB 37KB [ 2747.095029] PINGv6 63KB 63KB [ 2747.096169] RAWv6 378KB 378KB [ 2747.097315] UDPLITEv6 62KB 62KB [ 2747.098471] UDPv6 62KB 62KB [ 2747.099600] tw_sock_TCPv6 15KB 15KB [ 2747.100733] request_sock_TCPv6 15KB 15KB [ 2747.101925] TCPv6 62KB 62KB [ 2747.103132] scsi_sense_cache 8KB 8KB [ 2747.104276] sd_ext_cdb 3KB 3KB [ 2747.105439] virtio_scsi_cmd 16KB 16KB [ 2747.106612] sgpool-128 59KB 59KB [ 2747.107767] sgpool-64 63KB 63KB [ 2747.108947] sgpool-32 141KB 141KB [ 2747.110160] sgpool-16 82KB 82KB [ 2747.111395] sgpool-8 75KB 75KB [ 2747.112687] io_kiocb 45KB 60KB [ 2747.113876] mqueue_inode_cache 62KB 62KB [ 2747.115088] nfs_commit_data 15KB 15KB [ 2747.116260] nfs_write_data 47KB 47KB [ 2747.117459] jbd2_inode 7KB 7KB [ 2747.118655] ext4_system_zone 7KB 7KB [ 2747.119836] ext4_io_end_vec 7KB 7KB [ 2747.121026] ext4_bio_post_read_ctx 15KB 15KB [ 2747.122361] kioctx 31KB 31KB [ 2747.123557] aio_kiocb 7KB 7KB [ 2747.124756] dio 30KB 30KB [ 2747.125966] bio-2 4KB 4KB [ 2747.127192] fasync_cache 7KB 7KB [ 2747.128404] pid_namespace 7KB 7KB [ 2747.129628] posix_timers_cache 15KB 15KB [ 2747.130867] rpc_buffers 31KB 31KB [ 2747.132097] rpc_tasks 3KB 3KB [ 2747.133324] UNIX 416KB 416KB [ 2747.134588] UDP-Lite 31KB 31KB [ 2747.136042] tcp_bind_bucket 8KB 8KB [ 2747.137609] xfrm_state 112KB 112KB [ 2747.139161] ip_fib_trie 8KB 8KB [ 2747.140728] ip_fib_alias 19KB 19KB [ 2747.142037] ip_dst_cache 40KB 60KB [ 2747.143259] PING 62KB 62KB [ 2747.144469] RAW 93KB 93KB [ 2747.145690] UDP 222KB 315KB [ 2747.146899] tw_sock_TCP 7KB 7KB [ 2747.148141] request_sock_TCP 15KB 15KB [ 2747.149360] TCP 60KB 60KB [ 2747.150613] hugetlbfs_inode_cache 30KB 30KB [ 2747.151953] bio-1 11KB 11KB [ 2747.153195] eventpoll_pwq 23KB 23KB [ 2747.154445] eventpoll_epi 47KB 47KB [ 2747.155689] inotify_inode_mark 46KB 46KB [ 2747.156957] request_queue 60KB 60KB [ 2747.158240] blkdev_ioc 60KB 60KB [ 2747.159496] bio-0 152KB 152KB [ 2747.160742] biovec-max 811KB 811KB [ 2747.162009] biovec-128 63KB 63KB [ 2747.163295] biovec-64 204KB 283KB [ 2747.164558] biovec-16 60KB 60KB [ 2747.165839] user_namespace 31KB 31KB [ 2747.167130] uid_cache 8KB 8KB [ 2747.168417] dmaengine-unmap-2 4KB 4KB [ 2747.169725] audit_buffer 7KB 7KB [ 2747.171016] skbuff_fclone_cache 127KB 127KB [ 2747.172372] skbuff_head_cache 472KB 506KB [ 2747.173671] file_lock_cache 47KB 47KB [ 2747.174966] file_lock_ctx 7KB 7KB [ 2747.176222] fsnotify_mark_connector 24KB 24KB [ 2747.177418] net_namespace 115KB 115KB [ 2747.178500] task_delay_info 146KB 146KB [ 2747.179601] taskstats 84KB 84KB [ 2747.180703] proc_dir_entry 361KB 375KB [ 2747.181781] pde_opener 31KB 31KB [ 2747.182874] seq_file 86KB 86KB [ 2747.183972] sigqueue 110KB 110KB [ 2747.185087] shmem_inode_cache 1289KB 1289KB [ 2747.186185] kernfs_iattrs_cache 250KB 250KB [ 2747.187348] kernfs_node_cache 5221KB 5268KB [ 2747.188505] mnt_cache 199KB 212KB [ 2747.189756] filp 2283KB 2422KB [ 2747.190960] names_cache 20629KB 21003KB [ 2747.192073] hashtab_node 274KB 274KB [ 2747.193226] ebitmap_node 1149KB 1149KB [ 2747.194336] avtab_node 4976KB 4976KB [ 2747.195461] avc_node 35KB 35KB [ 2747.196585] lsm_inode_cache 2653KB 2960KB [ 2747.197690] lsm_file_cache 188KB 196KB [ 2747.198807] key_jar 31KB 31KB [ 2747.199883] uts_namespace 15KB 15KB [ 2747.200991] nsproxy 7KB 7KB [ 2747.202130] vm_area_struct 1307KB 1476KB [ 2747.203213] mm_struct 409KB 567KB [ 2747.204296] fs_cache 79KB 100KB [ 2747.205392] files_cache 297KB 398KB [ 2747.206470] signal_cache 318KB 524KB [ 2747.207587] sighand_cache 300KB 360KB [ 2747.208649] task_struct 1824KB 1968KB [ 2747.209774] cred_jar 152KB 196KB [ 2747.210885] anon_vma_chain 406KB 492KB [ 2747.211957] anon_vma 273KB 286KB [ 2747.213067] pid 104KB 108KB [ 2747.214194] Acpi-Operand 88KB 122KB [ 2747.215286] Acpi-ParseExt 31KB 31KB [ 2747.216387] Acpi-Parse 158KB 173KB [ 2747.217499] Acpi-State 82KB 98KB [ 2747.218599] Acpi-Namespace 24KB 24KB [ 2747.219699] shared_policy_node 4KB 4KB [ 2747.220812] numa_policy 7KB 7KB [ 2747.221838] trace_event_file 163KB 163KB [ 2747.222953] ftrace_event_field 280KB 280KB [ 2747.224080] pool_workqueue 40KB 40KB [ 2747.225229] task_group 16KB 16KB [ 2747.226476] vmap_area 85KB 102KB [ 2747.227572] page->ptl 354KB 378KB [ 2747.228671] kmemleak_scan_area 41KB 55KB [ 2747.230375] kmemleak_object 134775KB 147090KB [ 2747.231493] kmalloc-8k 4832KB 4960KB [ 2747.232557] kmalloc-4k 8816KB 8928KB [ 2747.233660] kmalloc-2k 4480KB 4736KB [ 2747.234769] kmalloc-1k 2380KB 3680KB [ 2747.235875] kmalloc-512 3213KB 3760KB [ 2747.236982] kmalloc-256 1177KB 1296KB [ 2747.238093] kmalloc-192 354KB 520KB [ 2747.239181] kmalloc-128 559KB 596KB [ 2747.240261] kmalloc-96 391KB 596KB [ 2747.241330] kmalloc-64 1086KB 1240KB [ 2747.242421] kmalloc-32 935KB 952KB [ 2747.243481] kmalloc-16 376KB 376KB [ 2747.244572] kmalloc-8 302KB 330KB [ 2747.245642] kmem_cache_node 47KB 47KB [ 2747.246694] kmem_cache 75KB 75KB [ 2747.247795] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0,global_oom,task_memcg=/syz5,task=syz-executor.5,pid=292,uid=0 [ 2747.250583] Out of memory (oom_kill_allocating_task): Killed process 292 (syz-executor.5) total-vm:93280kB, anon-rss:392kB, file-rss:34820kB, shmem-rss:0kB, UID:0 pgtables:116kB oom_score_adj:0 [ 2747.314880] systemd-journal invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-250 [ 2747.317364] CPU: 0 PID: 103 Comm: systemd-journal Not tainted 5.10.184 #1 [ 2747.318823] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2747.320504] Call Trace: [ 2747.321058] dump_stack+0x107/0x167 [ 2747.321827] dump_header+0x106/0x65e [ 2747.322608] oom_kill_process.cold+0x10/0x15 [ 2747.323490] out_of_memory+0x1149/0x1440 [ 2747.324343] ? oom_killer_disable+0x280/0x280 [ 2747.325253] ? mutex_trylock+0x237/0x2b0 [ 2747.326119] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2747.327325] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2747.328541] ? lock_acquire+0xd7/0x470 [ 2747.329341] ? warn_alloc+0x190/0x190 [ 2747.330170] __alloc_pages_nodemask+0x51d/0x600 [ 2747.331134] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2747.332373] ? find_get_entry+0x2c8/0x740 [ 2747.333237] alloc_pages_current+0x187/0x280 [ 2747.334153] __page_cache_alloc+0x2d2/0x360 [ 2747.335025] pagecache_get_page+0x2c7/0xc80 [ 2747.335920] filemap_fault+0x177d/0x2210 [ 2747.336766] ? read_cache_page_gfp+0x30/0x30 [ 2747.337669] ? replace_page_cache_page+0x1200/0x1200 [ 2747.338710] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2747.339780] ext4_filemap_fault+0x87/0xc0 [ 2747.340629] __do_fault+0x113/0x410 [ 2747.341369] handle_mm_fault+0x1e72/0x3520 [ 2747.342263] ? __pmd_alloc+0x5e0/0x5e0 [ 2747.343068] ? vmacache_find+0x55/0x2a0 [ 2747.343884] ? vmacache_update+0xce/0x140 [ 2747.344732] do_user_addr_fault+0x56e/0xc60 [ 2747.345638] exc_page_fault+0xa2/0x1a0 [ 2747.346416] ? asm_exc_page_fault+0x8/0x30 [ 2747.347287] asm_exc_page_fault+0x1e/0x30 [ 2747.348134] RIP: 0033:0x7f2cb3e18116 [ 2747.348899] Code: Unable to access opcode bytes at RIP 0x7f2cb3e180ec. [ 2747.350261] RSP: 002b:00007fff4b627c20 EFLAGS: 00010293 [ 2747.351357] RAX: 0000000000000001 RBX: 0000557ec5c92360 RCX: 00007f2cb3e18116 [ 2747.352792] RDX: 0000000000000014 RSI: 0000557ec5c98880 RDI: 0000000000000008 [ 2747.354265] RBP: ffffffffffffffff R08: 0000000000000000 R09: 00007fff4b756080 [ 2747.355731] R10: 00000000ffffffff R11: 0000000000000293 R12: 0000000000000001 [ 2747.357198] R13: 0000000000000014 R14: 0000000000000000 R15: 0000000000000000 [ 2747.359069] Mem-Info: [ 2747.359609] active_anon:522 inactive_anon:55861 isolated_anon:0 [ 2747.359609] active_file:10 inactive_file:24 isolated_file:3 [ 2747.359609] unevictable:0 dirty:0 writeback:0 [ 2747.359609] slab_reclaimable:6873 slab_unreclaimable:63967 [ 2747.359609] mapped:69634 shmem:102 pagetables:1661 bounce:0 [ 2747.359609] free:2725 free_pcp:0 free_cma:0 [ 2747.366174] Node 0 active_anon:2088kB inactive_anon:223444kB active_file:40kB inactive_file:96kB unevictable:0kB isolated(anon):0kB isolated(file):12kB mapped:278536kB dirty:0kB writeback:0kB shmem:408kB writeback_tmp:0kB kernel_stack:4512kB all_unreclaimable? no [ 2747.370834] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:12kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2747.376212] lowmem_reserve[]: 0 1616 1616 1616 [ 2747.377230] Node 0 DMA32 free:3404kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:2088kB inactive_anon:223600kB active_file:40kB inactive_file:96kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:6644kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 2747.383059] lowmem_reserve[]: 0 0 0 0 [ 2747.383878] Node 0 DMA: 2*4kB (UM) 0*8kB 1*16kB (M) 2*32kB (UM) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6488kB [ 2747.386992] Node 0 DMA32: 313*4kB (UM) 40*8kB (UM) 1*16kB (H) 1*32kB (H) 1*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 3604kB [ 2747.390137] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2747.391885] 139 total pagecache pages [ 2747.392691] 0 pages in swap cache [ 2747.393441] Swap cache stats: add 0, delete 0, find 0/0 [ 2747.394555] Free swap = 0kB [ 2747.395198] Total swap = 0kB [ 2747.395817] 524158 pages RAM [ 2747.396463] 0 pages HighMem/MovableOnly [ 2747.397297] 105055 pages reserved [ 2747.398046] Unreclaimable slab info: [ 2747.398804] Name Used Total [ 2747.399958] pid_3 7KB 7KB [ 2747.401074] pid_2 93KB 93KB [ 2747.402215] IEEE-802.15.4-MAC 63KB 63KB [ 2747.403333] IEEE-802.15.4-RAW 31KB 31KB [ 2747.404460] p9_req_t 8KB 8KB [ 2747.405589] ip6-frags 15KB 15KB [ 2747.406704] fib6_nodes 28KB 28KB [ 2747.407819] ip6_dst_cache 37KB 37KB [ 2747.408953] PINGv6 63KB 63KB [ 2747.410096] RAWv6 378KB 378KB [ 2747.411199] UDPLITEv6 62KB 62KB [ 2747.412285] UDPv6 62KB 62KB [ 2747.413378] tw_sock_TCPv6 15KB 15KB [ 2747.414488] request_sock_TCPv6 15KB 15KB [ 2747.415586] TCPv6 62KB 62KB [ 2747.416673] scsi_sense_cache 8KB 8KB [ 2747.417770] sd_ext_cdb 3KB 3KB [ 2747.418851] virtio_scsi_cmd 16KB 16KB [ 2747.419959] sgpool-128 59KB 59KB [ 2747.421073] sgpool-64 63KB 63KB [ 2747.422212] sgpool-32 141KB 141KB [ 2747.423309] sgpool-16 82KB 82KB [ 2747.424395] sgpool-8 75KB 75KB [ 2747.425487] io_kiocb 45KB 60KB [ 2747.426574] mqueue_inode_cache 62KB 62KB [ 2747.427672] nfs_commit_data 15KB 15KB [ 2747.428755] nfs_write_data 47KB 47KB [ 2747.429846] jbd2_inode 7KB 7KB [ 2747.430948] ext4_system_zone 7KB 7KB [ 2747.432027] ext4_io_end_vec 7KB 7KB [ 2747.433115] ext4_bio_post_read_ctx 15KB 15KB [ 2747.434313] kioctx 31KB 31KB [ 2747.435403] aio_kiocb 7KB 7KB [ 2747.436490] dio 30KB 30KB [ 2747.437584] bio-2 4KB 4KB [ 2747.438662] fasync_cache 7KB 7KB [ 2747.439743] pid_namespace 7KB 7KB [ 2747.440856] posix_timers_cache 15KB 15KB [ 2747.442005] rpc_buffers 31KB 31KB [ 2747.443107] rpc_tasks 3KB 3KB [ 2747.444226] UNIX 416KB 416KB [ 2747.445332] UDP-Lite 31KB 31KB [ 2747.446477] tcp_bind_bucket 8KB 8KB [ 2747.447591] xfrm_state 112KB 112KB [ 2747.448707] ip_fib_trie 8KB 8KB [ 2747.449837] ip_fib_alias 19KB 19KB [ 2747.450953] ip_dst_cache 40KB 60KB [ 2747.452076] PING 62KB 62KB [ 2747.453204] RAW 93KB 93KB [ 2747.454330] UDP 222KB 315KB [ 2747.455458] tw_sock_TCP 7KB 7KB [ 2747.456579] request_sock_TCP 15KB 15KB [ 2747.457718] TCP 60KB 60KB [ 2747.458846] hugetlbfs_inode_cache 30KB 30KB [ 2747.460030] bio-1 11KB 11KB [ 2747.461159] eventpoll_pwq 23KB 23KB [ 2747.462291] eventpoll_epi 47KB 47KB [ 2747.463409] inotify_inode_mark 46KB 46KB [ 2747.464555] request_queue 60KB 60KB [ 2747.465691] blkdev_ioc 60KB 60KB [ 2747.466817] bio-0 152KB 152KB [ 2747.467951] biovec-max 811KB 811KB [ 2747.469088] biovec-128 63KB 63KB [ 2747.470214] biovec-64 204KB 283KB [ 2747.471364] biovec-16 60KB 60KB [ 2747.472674] user_namespace 31KB 31KB [ 2747.474005] uid_cache 8KB 8KB [ 2747.475313] dmaengine-unmap-2 4KB 4KB [ 2747.476619] audit_buffer 7KB 7KB [ 2747.477963] skbuff_fclone_cache 127KB 127KB [ 2747.479320] skbuff_head_cache 472KB 506KB [ 2747.480629] file_lock_cache 47KB 47KB [ 2747.481960] file_lock_ctx 7KB 7KB [ 2747.483267] fsnotify_mark_connector 24KB 24KB [ 2747.484694] net_namespace 115KB 115KB [ 2747.486020] task_delay_info 146KB 146KB [ 2747.487331] taskstats 84KB 84KB [ 2747.488637] proc_dir_entry 361KB 375KB [ 2747.489967] pde_opener 31KB 31KB [ 2747.491274] seq_file 86KB 86KB [ 2747.492582] sigqueue 110KB 110KB [ 2747.493914] shmem_inode_cache 1289KB 1289KB [ 2747.495263] kernfs_iattrs_cache 250KB 250KB [ 2747.496620] kernfs_node_cache 5221KB 5268KB [ 2747.497960] mnt_cache 199KB 212KB [ 2747.499276] filp 2241KB 2415KB [ 2747.500594] names_cache 20170KB 20795KB [ 2747.501955] hashtab_node 274KB 274KB [ 2747.503274] ebitmap_node 1149KB 1149KB [ 2747.504583] avtab_node 4976KB 4976KB [ 2747.505905] avc_node 35KB 35KB [ 2747.507230] lsm_inode_cache 2653KB 2960KB [ 2747.508547] lsm_file_cache 188KB 196KB [ 2747.509875] key_jar 31KB 31KB [ 2747.511188] uts_namespace 15KB 15KB [ 2747.512497] nsproxy 7KB 7KB [ 2747.513823] vm_area_struct 1306KB 1476KB [ 2747.515130] mm_struct 409KB 567KB [ 2747.516437] fs_cache 79KB 100KB [ 2747.517751] files_cache 297KB 398KB [ 2747.519047] signal_cache 318KB 524KB [ 2747.520336] sighand_cache 300KB 360KB [ 2747.521638] task_struct 1798KB 1968KB [ 2747.522957] cred_jar 152KB 196KB [ 2747.524261] anon_vma_chain 406KB 492KB [ 2747.525566] anon_vma 273KB 286KB [ 2747.526862] pid 104KB 108KB [ 2747.528158] Acpi-Operand 88KB 122KB [ 2747.529472] Acpi-ParseExt 31KB 31KB [ 2747.530763] Acpi-Parse 158KB 173KB [ 2747.532074] Acpi-State 82KB 98KB [ 2747.533082] syz-executor.7: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz7 [ 2747.533400] Acpi-Namespace 24KB 24KB [ 2747.533407] ,mems_allowed=0 [ 2747.535848] shared_policy_node 4KB 4KB [ 2747.536935] CPU: 1 PID: 14396 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 2747.537657] numa_policy 7KB 7KB [ 2747.538675] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2747.538682] Call Trace: [ 2747.538705] dump_stack+0x107/0x167 [ 2747.538729] warn_alloc.cold+0x95/0x18a [ 2747.540367] trace_event_file 163KB 163KB [ 2747.541417] ? zone_watermark_ok_safe+0x260/0x260 [ 2747.541439] ? schedule_timeout+0x1ce/0x380 [ 2747.543429] ftrace_event_field 280KB 280KB [ 2747.543908] ? usleep_range+0x170/0x170 [ 2747.544775] pool_workqueue 40KB 40KB [ 2747.545534] ? __next_timer_interrupt+0x2c0/0x2c0 [ 2747.545577] __alloc_pages_slowpath.constprop.0+0x1c80/0x2130 [ 2747.546839] task_group 16KB 16KB [ 2747.547781] ? lock_acquire+0xd7/0x470 [ 2747.547808] ? warn_alloc+0x190/0x190 [ 2747.548839] vmap_area 85KB 102KB [ 2747.549922] __alloc_pages_nodemask+0x51d/0x600 [ 2747.549946] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2747.550887] page->ptl 354KB 378KB [ 2747.551903] ? trace_hardirqs_on+0x5b/0x180 [ 2747.551928] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2747.551951] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2747.553077] kmemleak_scan_area 41KB 55KB [ 2747.554225] ? alloc_pages_current+0x39/0x280 [ 2747.554245] ? alloc_pages_current+0x47/0x280 [ 2747.555861] kmemleak_object 134506KB 147083KB [ 2747.556234] alloc_pages_current+0x187/0x280 [ 2747.556257] relay_open_buf.part.0+0x2a5/0xc00 [ 2747.557168] kmalloc-8k 4832KB 4960KB [ 2747.558217] relay_open+0x531/0xa10 [ 2747.558244] do_blk_trace_setup+0x4cf/0xc10 [ 2747.559329] kmalloc-4k 8760KB 8928KB [ 2747.560372] ? _copy_from_user+0xfb/0x1b0 [ 2747.560395] __blk_trace_setup+0xca/0x180 [ 2747.561682] kmalloc-2k 4476KB 4736KB [ 2747.562497] ? do_blk_trace_setup+0xc10/0xc10 [ 2747.562527] ? perf_trace_lock+0xac/0x490 [ 2747.563966] kmalloc-1k 2380KB 3680KB [ 2747.564985] ? SOFTIRQ_verbose+0x10/0x10 [ 2747.565016] blk_trace_setup+0x43/0x60 [ 2747.566295] kmalloc-512 3207KB 3760KB [ 2747.567152] sg_ioctl_common+0x634/0x2570 [ 2747.567178] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2747.568238] kmalloc-256 1177KB 1296KB [ 2747.569235] ? do_vfs_ioctl+0x283/0x10d0 [ 2747.569251] ? sg_write+0x120/0x120 [ 2747.569270] ? generic_block_fiemap+0x60/0x60 [ 2747.570324] kmalloc-192 354KB 520KB [ 2747.571211] ? selinux_file_ioctl+0xb6/0x270 [ 2747.572469] kmalloc-128 552KB 596KB [ 2747.573135] ? sg_compat_ioctl+0x120/0x120 [ 2747.573154] sg_ioctl+0x8f/0x120 [ 2747.573175] __x64_sys_ioctl+0x19a/0x210 [ 2747.574224] kmalloc-96 391KB 596KB [ 2747.575232] do_syscall_64+0x33/0x40 [ 2747.575257] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2747.576239] kmalloc-64 1085KB 1240KB [ 2747.577007] RIP: 0033:0x7f1ac5591b19 [ 2747.577024] Code: Unable to access opcode bytes at RIP 0x7f1ac5591aef. [ 2747.577039] RSP: 002b:00007f1ac2b07188 EFLAGS: 00000246 [ 2747.578305] kmalloc-32 934KB 952KB [ 2747.579159] ORIG_RAX: 0000000000000010 [ 2747.579178] RAX: ffffffffffffffda RBX: 00007f1ac56a4f60 RCX: 00007f1ac5591b19 [ 2747.579199] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 2747.580175] kmalloc-16 376KB 376KB [ 2747.581445] RBP: 00007f1ac55ebf6d R08: 0000000000000000 R09: 0000000000000000 [ 2747.581461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2747.581481] R13: 00007ffd3b2574cf R14: 00007f1ac2b07300 R15: 0000000000022000 [ 2747.582439] kmalloc-8 302KB 330KB [ 2747.583470] Mem-Info: [ 2747.584570] kmem_cache_node 47KB 47KB [ 2747.585579] active_anon:522 inactive_anon:55861 isolated_anon:0 [ 2747.585579] active_file:10 inactive_file:24 isolated_file:3 [ 2747.585579] unevictable:0 dirty:0 writeback:0 [ 2747.585579] slab_reclaimable:6873 slab_unreclaimable:63967 [ 2747.585579] mapped:69634 shmem:102 pagetables:1661 bounce:0 [ 2747.585579] free:2347 free_pcp:62 free_cma:0 [ 2747.586748] kmem_cache 75KB 75KB [ 2747.586767] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null) [ 2747.588023] Node 0 active_anon:2088kB inactive_anon:223444kB active_file:40kB inactive_file:96kB unevictable:0kB isolated(anon):0kB isolated(file):12kB mapped:278536kB dirty:0kB writeback:0kB shmem:408kB writeback_tmp:0kB kernel_stack:4512kB all_unreclaimable? yes [ 2747.588914] ,cpuset= [ 2747.589758] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:12kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2747.591148] / [ 2747.592345] lowmem_reserve[]: [ 2747.593362] ,mems_allowed=0 [ 2747.594413] 0 1616 [ 2747.595414] ,global_oom [ 2747.596079] 1616 1616 [ 2747.597049] ,task_memcg= [ 2747.598089] [ 2747.598104] Node 0 [ 2747.598982] /system.slice/systemd-journald.service [ 2747.600018] DMA32 free:2900kB min:9212kB low:10864kB high:12516kB reserved_highatomic:2048KB active_anon:2088kB inactive_anon:223600kB active_file:40kB inactive_file:96kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:6644kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 2747.601208] ,task=systemd-journal,pid=103,uid=0 [ 2747.601921] lowmem_reserve[]: [ 2747.603514] Out of memory (oom_kill_allocating_task): Killed process 103 (systemd-journal) total-vm:31948kB, anon-rss:900kB, file-rss:0kB, shmem-rss:4kB, UID:0 pgtables:88kB oom_score_adj:-250 [ 2747.604489] 0 0 [ 2747.606844] syz-executor.2 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2747.607938] 0 0 [ 2747.607966] Node 0 [ 2747.609666] CPU: 0 PID: 285 Comm: syz-executor.2 Not tainted 5.10.184 #1 [ 2747.610672] DMA: [ 2747.612284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2747.612291] Call Trace: [ 2747.612321] dump_stack+0x107/0x167 [ 2747.613706] 2*4kB [ 2747.615327] dump_header+0x106/0x65e [ 2747.615356] oom_kill_process.cold+0x10/0x15 [ 2747.616358] (UM) [ 2747.616902] out_of_memory+0x1149/0x1440 [ 2747.617924] 0*8kB [ 2747.624998] ? oom_killer_disable+0x280/0x280 [ 2747.625023] ? mutex_trylock+0x237/0x2b0 [ 2747.625048] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2747.625082] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2747.625123] ? lock_acquire+0xd7/0x470 [ 2747.625154] ? warn_alloc+0x190/0x190 [ 2747.625210] __alloc_pages_nodemask+0x51d/0x600 [ 2747.626277] 1*16kB [ 2747.627625] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2747.627652] ? find_get_entry+0x2c8/0x740 [ 2747.632139] (M) [ 2747.632675] alloc_pages_current+0x187/0x280 [ 2747.637615] 2*32kB [ 2747.637998] __page_cache_alloc+0x2d2/0x360 [ 2747.638027] pagecache_get_page+0x2c7/0xc80 [ 2747.638603] (UM) [ 2747.639281] filemap_fault+0x177d/0x2210 [ 2747.639315] ? read_cache_page_gfp+0x30/0x30 [ 2747.639717] 2*64kB [ 2747.640311] ? replace_page_cache_page+0x1200/0x1200 [ 2747.640333] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2747.640796] (UM) [ 2747.641424] ext4_filemap_fault+0x87/0xc0 [ 2747.641444] __do_fault+0x113/0x410 [ 2747.641758] 1*128kB [ 2747.642274] handle_mm_fault+0x1e72/0x3520 [ 2747.642307] ? __pmd_alloc+0x5e0/0x5e0 [ 2747.643355] (M) [ 2747.649749] ? vmacache_find+0x55/0x2a0 [ 2747.649769] ? vmacache_update+0xce/0x140 [ 2747.650676] 2*256kB [ 2747.651372] do_user_addr_fault+0x56e/0xc60 [ 2747.651406] exc_page_fault+0xa2/0x1a0 [ 2747.654660] (UM) [ 2747.655100] ? asm_exc_page_fault+0x8/0x30 [ 2747.655126] asm_exc_page_fault+0x1e/0x30 [ 2747.657080] 1*512kB [ 2747.657527] RIP: 0033:0x7f44d4819688 [ 2747.657953] (M) [ 2747.659449] Code: Unable to access opcode bytes at RIP 0x7f44d481965e. [ 2747.659461] RSP: 002b:00007ffd7f6dc6c0 EFLAGS: 00010206 [ 2747.659868] 1*1024kB [ 2747.661739] RAX: 0000001b2d020000 RBX: 00000000000003d0 RCX: 000000000029e690 [ 2747.661752] RDX: 000000000029e9ff RSI: 00007ffd7f6dc780 RDI: 0000000000000001 [ 2747.661768] RBP: 00007ffd7f6dc71c R08: 0000000000000aba R09: 00007ffd7f73b080 [ 2747.662278] (M) [ 2747.663066] R10: 00007ffd7f73b090 R11: 00000000004e445a R12: 0000000000000032 [ 2747.663079] R13: 000000000029e7e3 R14: 0000000000000007 R15: 00007ffd7f6dc780 [ 2747.663344] Mem-Info: [ 2747.663497] 0*2048kB [ 2747.664411] active_anon:522 inactive_anon:55861 isolated_anon:0 [ 2747.664411] active_file:10 inactive_file:24 isolated_file:3 [ 2747.664411] unevictable:0 dirty:0 writeback:0 [ 2747.664411] slab_reclaimable:6873 slab_unreclaimable:63967 [ 2747.664411] mapped:69634 shmem:102 pagetables:1661 bounce:0 [ 2747.664411] free:2347 free_pcp:62 free_cma:0 [ 2747.665211] 1*4096kB (M) [ 2747.665721] Node 0 active_anon:2088kB inactive_anon:223444kB active_file:40kB inactive_file:96kB unevictable:0kB isolated(anon):0kB isolated(file):12kB mapped:278536kB dirty:0kB writeback:0kB shmem:408kB writeback_tmp:0kB kernel_stack:4512kB all_unreclaimable? yes [ 2747.666468] = 6488kB [ 2747.666479] Node 0 [ 2747.666987] Node 0 [ 2747.667814] DMA32: [ 2747.668769] DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:12kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2747.669858] 200*4kB (M) [ 2747.671193] lowmem_reserve[]: [ 2747.671919] 2*8kB [ 2747.672779] 0 [ 2747.673804] (U) [ 2747.674332] 1616 [ 2747.675463] 1*16kB (H) [ 2747.676414] 1616 [ 2747.676789] 1*32kB [ 2747.677786] 1616 [ 2747.678235] (H) 1*64kB [ 2747.679213] [ 2747.680035] (H) 1*128kB [ 2747.680504] Node 0 [ 2747.681287] (H) 1*256kB [ 2747.682339] DMA32 free:2900kB min:9212kB low:10864kB high:12516kB reserved_highatomic:2048KB active_anon:2088kB inactive_anon:223600kB active_file:40kB inactive_file:96kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:6644kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 2747.682353] lowmem_reserve[]: [ 2747.682872] (H) [ 2747.684008] 0 0 [ 2747.685251] 1*512kB [ 2747.685702] 0 0 [ 2747.686508] (H) 1*1024kB [ 2747.687336] [ 2747.687762] (H) [ 2747.688713] Node 0 [ 2747.689463] 0*2048kB 0*4096kB [ 2747.689920] DMA: [ 2747.690663] = 2848kB [ 2747.691580] 2*4kB [ 2747.692033] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2747.692044] 139 total pagecache pages [ 2747.693016] (UM) 0*8kB [ 2747.693747] 0 pages in swap cache [ 2747.694235] 1*16kB [ 2747.695033] Swap cache stats: add 0, delete 0, find 0/0 [ 2747.695043] Free swap = 0kB [ 2747.695974] (M) [ 2747.696414] Total swap = 0kB [ 2747.697250] 2*32kB [ 2747.697640] 524158 pages RAM [ 2747.699107] (UM) [ 2747.700098] 0 pages HighMem/MovableOnly [ 2747.700108] 105055 pages reserved [ 2747.700640] 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6488kB [ 2747.766536] Node 0 DMA32: 2694*4kB (UME) 1164*8kB (UME) 527*16kB (UMEH) 280*32kB (UMEH) 100*64kB (UMEH) 36*128kB (UMEH) 17*256kB (UMH) 10*512kB (UMH) 7*1024kB (UH) 9*2048kB (U) 54*4096kB (U) = 304744kB [ 2747.770920] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2747.773021] 370 total pagecache pages [ 2747.774085] 0 pages in swap cache [ 2747.775038] Swap cache stats: add 0, delete 0, find 0/0 [ 2747.776383] Free swap = 0kB [ 2747.777226] Total swap = 0kB [ 2747.777973] 524158 pages RAM [ 2747.778749] 0 pages HighMem/MovableOnly [ 2747.779791] 105055 pages reserved [ 2747.780599] Unreclaimable slab info: [ 2747.781562] Name Used Total [ 2747.783018] pid_3 7KB 7KB [ 2747.784377] pid_2 93KB 93KB [ 2747.785748] IEEE-802.15.4-MAC 63KB 63KB [ 2747.787109] IEEE-802.15.4-RAW 31KB 31KB [ 2747.788493] p9_req_t 8KB 8KB [ 2747.789868] ip6-frags 15KB 15KB [ 2747.791224] fib6_nodes 28KB 28KB [ 2747.792586] ip6_dst_cache 37KB 37KB [ 2747.793973] PINGv6 63KB 63KB [ 2747.795328] RAWv6 378KB 378KB [ 2747.796705] UDPLITEv6 62KB 62KB [ 2747.798072] UDPv6 62KB 62KB [ 2747.799427] tw_sock_TCPv6 15KB 15KB [ 2747.800777] request_sock_TCPv6 15KB 15KB [ 2747.802139] TCPv6 62KB 62KB [ 2747.803479] scsi_sense_cache 8KB 8KB [ 2747.804816] sd_ext_cdb 3KB 3KB [ 2747.806172] virtio_scsi_cmd 16KB 16KB [ 2747.807519] sgpool-128 59KB 59KB [ 2747.808860] sgpool-64 63KB 63KB [ 2747.810193] sgpool-32 141KB 141KB [ 2747.811627] sgpool-16 82KB 82KB [ 2747.813016] sgpool-8 75KB 75KB [ 2747.814401] io_kiocb 45KB 60KB [ 2747.815766] mqueue_inode_cache 62KB 62KB [ 2747.816985] nfs_commit_data 15KB 15KB [ 2747.818183] nfs_write_data 47KB 47KB [ 2747.819361] jbd2_inode 7KB 7KB [ 2747.820511] ext4_system_zone 7KB 7KB [ 2747.821679] ext4_io_end_vec 7KB 7KB [ 2747.822818] ext4_bio_post_read_ctx 15KB 15KB [ 2747.824081] kioctx 31KB 31KB [ 2747.825254] aio_kiocb 7KB 7KB [ 2747.826437] dio 30KB 30KB [ 2747.827607] bio-2 4KB 4KB [ 2747.828780] fasync_cache 7KB 7KB [ 2747.829979] pid_namespace 7KB 7KB [ 2747.831153] posix_timers_cache 15KB 15KB [ 2747.832345] rpc_buffers 31KB 31KB [ 2747.833534] rpc_tasks 3KB 3KB [ 2747.834706] UNIX 416KB 416KB [ 2747.835881] UDP-Lite 31KB 31KB [ 2747.837044] tcp_bind_bucket 8KB 8KB [ 2747.838229] xfrm_state 112KB 112KB [ 2747.839387] ip_fib_trie 8KB 8KB [ 2747.840522] ip_fib_alias 19KB 19KB [ 2747.841698] ip_dst_cache 40KB 60KB [ 2747.842853] PING 62KB 62KB [ 2747.843996] RAW 93KB 93KB [ 2747.845149] UDP 222KB 315KB [ 2747.846326] tw_sock_TCP 7KB 7KB [ 2747.847479] request_sock_TCP 15KB 15KB [ 2747.848632] TCP 60KB 60KB [ 2747.849806] hugetlbfs_inode_cache 30KB 30KB [ 2747.851037] bio-1 11KB 11KB [ 2747.852216] eventpoll_pwq 23KB 23KB [ 2747.853350] eventpoll_epi 47KB 47KB [ 2747.854516] inotify_inode_mark 46KB 46KB [ 2747.855668] request_queue 60KB 60KB [ 2747.856801] blkdev_ioc 60KB 60KB [ 2747.857959] bio-0 152KB 152KB [ 2747.859095] biovec-max 811KB 811KB [ 2747.860242] biovec-128 63KB 63KB [ 2747.861407] biovec-64 204KB 283KB [ 2747.862570] biovec-16 60KB 60KB [ 2747.863730] user_namespace 31KB 31KB [ 2747.864888] uid_cache 8KB 8KB [ 2747.866061] dmaengine-unmap-2 4KB 4KB [ 2747.867219] audit_buffer 7KB 7KB [ 2747.868391] skbuff_fclone_cache 127KB 127KB [ 2747.869574] skbuff_head_cache 472KB 506KB [ 2747.870708] file_lock_cache 47KB 47KB [ 2747.871822] file_lock_ctx 7KB 7KB [ 2747.872924] fsnotify_mark_connector 24KB 24KB [ 2747.874170] net_namespace 115KB 115KB [ 2747.875272] task_delay_info 146KB 146KB [ 2747.876381] taskstats 84KB 84KB [ 2747.877517] proc_dir_entry 361KB 375KB [ 2747.878628] pde_opener 31KB 31KB [ 2747.879761] seq_file 86KB 86KB [ 2747.880885] sigqueue 110KB 110KB [ 2747.882025] shmem_inode_cache 1289KB 1289KB [ 2747.883148] kernfs_iattrs_cache 250KB 250KB [ 2747.884311] kernfs_node_cache 5221KB 5268KB [ 2747.885485] mnt_cache 199KB 212KB [ 2747.886620] filp 2241KB 2415KB [ 2747.887757] names_cache 20170KB 20795KB [ 2747.888871] hashtab_node 274KB 274KB [ 2747.889995] ebitmap_node 1149KB 1149KB [ 2747.891113] avtab_node 4976KB 4976KB [ 2747.892227] avc_node 35KB 35KB [ 2747.893362] lsm_inode_cache 2653KB 2960KB [ 2747.894501] lsm_file_cache 188KB 196KB [ 2747.895646] key_jar 31KB 31KB [ 2747.897052] uts_namespace 15KB 15KB [ 2747.898369] nsproxy 7KB 7KB [ 2747.899542] vm_area_struct 1306KB 1476KB [ 2747.900694] mm_struct 409KB 567KB [ 2747.901854] fs_cache 79KB 100KB [ 2747.903201] files_cache 297KB 398KB [ 2747.904359] signal_cache 318KB 524KB [ 2747.905667] sighand_cache 300KB 360KB [ 2747.906982] task_struct 1798KB 1968KB [ 2747.908284] cred_jar 152KB 196KB [ 2747.909594] anon_vma_chain 406KB 492KB [ 2747.910920] anon_vma 256KB 278KB [ 2747.912227] pid 104KB 108KB [ 2747.913381] Acpi-Operand 88KB 122KB [ 2747.914674] Acpi-ParseExt 31KB 31KB [ 2747.915820] Acpi-Parse 158KB 173KB [ 2747.916973] Acpi-State 82KB 98KB [ 2747.918258] Acpi-Namespace 24KB 24KB [ 2747.919550] shared_policy_node 4KB 4KB [ 2747.920705] numa_policy 7KB 7KB [ 2747.922017] trace_event_file 163KB 163KB [ 2747.923324] ftrace_event_field 280KB 280KB [ 2747.924616] pool_workqueue 40KB 40KB [ 2747.925889] task_group 16KB 16KB [ 2747.927001] vmap_area 85KB 102KB [ 2747.928135] page->ptl 354KB 378KB [ 2747.929247] kmemleak_scan_area 41KB 55KB [ 2747.930794] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 2747.931190] kmemleak_object 134653KB 147083KB [ 2747.933473] kmalloc-8k 4832KB 4960KB [ 2747.934612] kmalloc-4k 8808KB 8928KB [ 2747.935720] kmalloc-2k 4476KB 4736KB [ 2747.936187] systemd[1]: systemd-journald.service: Failed with result 'oom-kill'. [ 2747.936814] kmalloc-1k 2380KB 3680KB [ 2747.939154] kmalloc-512 3225KB 3760KB [ 2747.940267] kmalloc-256 1177KB 1296KB [ 2747.941387] kmalloc-192 354KB 520KB [ 2747.942491] kmalloc-128 552KB 596KB [ 2747.943596] kmalloc-96 391KB 596KB [ 2747.944877] kmalloc-64 1085KB 1240KB [ 2747.945987] kmalloc-32 934KB 952KB [ 2747.947081] kmalloc-16 376KB 376KB [ 2747.948190] kmalloc-8 302KB 330KB [ 2747.949277] kmem_cache_node 47KB 47KB [ 2747.950395] kmem_cache 75KB 75KB [ 2747.951486] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0,global_oom,task_memcg=/syz2,task=syz-executor.2,pid=285,uid=0 [ 2747.954329] Out of memory (oom_kill_allocating_task): Killed process 285 (syz-executor.2) total-vm:93280kB, anon-rss:384kB, file-rss:34820kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:0 [ 2747.995092] systemd[1]: systemd-journald.service: Consumed 6.515s CPU time. [ 2748.005600] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 2748.101494] systemd[1]: Stopping Flush Journal to Persistent Storage... [ 2748.197559] systemd[1]: Starting Load/Save RF Kill Switch Status... [ 2748.362509] systemd[1]: Started Load/Save RF Kill Switch Status. [ 2748.399338] systemd[1]: systemd-journal-flush.service: Succeeded. [ 2748.412946] systemd[1]: Stopped Flush Journal to Persistent Storage. [ 2748.414391] systemd[1]: Stopped Journal Service. [ 2748.415297] systemd[1]: systemd-journald.service: Consumed 6.515s CPU time. [ 2748.439792] systemd[1]: Starting Journal Service... [ 2748.533073] systemd-journald[14439]: File /var/log/journal/7e681e5076844de4a5cfa8606a84b008/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 2748.717165] syz-executor.7 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2748.719567] CPU: 0 PID: 291 Comm: syz-executor.7 Not tainted 5.10.184 #1 [ 2748.721068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2748.722931] Call Trace: [ 2748.723525] dump_stack+0x107/0x167 [ 2748.724348] dump_header+0x106/0x65e [ 2748.725184] oom_kill_process.cold+0x10/0x15 [ 2748.726171] out_of_memory+0x1149/0x1440 [ 2748.727079] ? oom_killer_disable+0x280/0x280 [ 2748.728070] ? mutex_trylock+0x237/0x2b0 [ 2748.728969] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2748.730297] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2748.731601] ? lock_acquire+0xd7/0x470 [ 2748.732472] ? warn_alloc+0x190/0x190 [ 2748.733342] __alloc_pages_nodemask+0x51d/0x600 [ 2748.734381] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2748.735709] ? find_get_entry+0x2c8/0x740 [ 2748.736673] alloc_pages_current+0x187/0x280 [ 2748.737662] __page_cache_alloc+0x2d2/0x360 [ 2748.738617] pagecache_get_page+0x2c7/0xc80 [ 2748.739573] filemap_fault+0x177d/0x2210 [ 2748.740486] ? read_cache_page_gfp+0x30/0x30 [ 2748.741485] ? replace_page_cache_page+0x1200/0x1200 [ 2748.742599] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2748.743780] ext4_filemap_fault+0x87/0xc0 [ 2748.744696] __do_fault+0x113/0x410 [ 2748.745531] handle_mm_fault+0x1e72/0x3520 [ 2748.746478] ? __pmd_alloc+0x5e0/0x5e0 [ 2748.747342] ? vmacache_find+0x55/0x2a0 [ 2748.748220] ? vmacache_update+0xce/0x140 [ 2748.749165] do_user_addr_fault+0x56e/0xc60 [ 2748.750141] exc_page_fault+0xa2/0x1a0 [ 2748.751003] ? asm_exc_page_fault+0x8/0x30 [ 2748.751935] asm_exc_page_fault+0x1e/0x30 [ 2748.752842] RIP: 0033:0x7f1ac558fd20 [ 2748.753668] Code: 83 c4 08 89 c7 e9 30 ff ff ff 48 c7 c0 bc ff ff ff 64 c7 00 02 00 00 00 31 c0 c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 <80> 3f 00 74 1b 48 83 ec 08 be 00 08 09 00 31 c0 e8 db 18 00 00 48 [ 2748.757720] RSP: 002b:00007ffd3b257718 EFLAGS: 00010206 [ 2748.758900] RAX: 0000000000000000 RBX: 000000000000044e RCX: 0000000000000000 [ 2748.760474] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f1ac55eb1a9 [ 2748.762052] RBP: 00007ffd3b25777c R08: 0000000000000000 R09: 00007ffd3b2cd080 [ 2748.763618] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2748.765183] R13: 000000000029e7c4 R14: 000000000000000a R15: 00007ffd3b2577e0 [ 2748.767170] Mem-Info: [ 2748.768150] active_anon:522 inactive_anon:55816 isolated_anon:0 [ 2748.768150] active_file:1125 inactive_file:1078 isolated_file:41 [ 2748.768150] unevictable:0 dirty:252 writeback:0 [ 2748.768150] slab_reclaimable:6873 slab_unreclaimable:62785 [ 2748.768150] mapped:62851 shmem:102 pagetables:1431 bounce:0 [ 2748.768150] free:3962 free_pcp:455 free_cma:0 [ 2748.776873] Node 0 active_anon:2088kB inactive_anon:223264kB active_file:4376kB inactive_file:4312kB unevictable:0kB isolated(anon):0kB isolated(file):164kB mapped:251236kB dirty:1008kB writeback:0kB shmem:408kB writeback_tmp:0kB kernel_stack:4192kB all_unreclaimable? no [ 2748.782754] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:12kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2748.788770] lowmem_reserve[]: 0 1616 1616 1616 [ 2748.790081] Node 0 DMA32 free:10872kB min:7164kB low:8816kB high:10468kB reserved_highatomic:2048KB active_anon:2088kB inactive_anon:223252kB active_file:4556kB inactive_file:3272kB unevictable:0kB writepending:1116kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:5724kB bounce:0kB free_pcp:2008kB local_pcp:412kB free_cma:0kB [ 2748.796700] lowmem_reserve[]: 0 0 0 0 [ 2748.797784] Node 0 DMA: 2*4kB (UM) 0*8kB 1*16kB (M) 2*32kB (UM) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6488kB [ 2748.801306] Node 0 DMA32: 1164*4kB (M) 308*8kB (M) 73*16kB (UMH) 23*32kB (UMH) 1*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 11008kB [ 2748.804927] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2748.806999] 1897 total pagecache pages [ 2748.807879] 0 pages in swap cache [ 2748.808787] Swap cache stats: add 0, delete 0, find 0/0 [ 2748.810171] Free swap = 0kB [ 2748.810849] Total swap = 0kB [ 2748.811678] 524158 pages RAM [ 2748.812518] 0 pages HighMem/MovableOnly [ 2748.813582] 105055 pages reserved [ 2748.814515] Unreclaimable slab info: [ 2748.815502] Name Used Total [ 2748.816899] pid_3 7KB 7KB [ 2748.818242] pid_2 93KB 93KB [ 2748.819586] IEEE-802.15.4-MAC 63KB 63KB [ 2748.820925] IEEE-802.15.4-RAW 31KB 31KB [ 2748.822290] p9_req_t 8KB 8KB [ 2748.823632] ip6-frags 15KB 15KB [ 2748.824996] fib6_nodes 28KB 28KB [ 2748.826371] ip6_dst_cache 37KB 37KB [ 2748.827709] PINGv6 63KB 63KB [ 2748.829057] RAWv6 378KB 378KB [ 2748.830402] UDPLITEv6 62KB 62KB [ 2748.831747] UDPv6 62KB 62KB [ 2748.833078] tw_sock_TCPv6 15KB 15KB [ 2748.834436] request_sock_TCPv6 15KB 15KB [ 2748.835819] TCPv6 62KB 62KB [ 2748.837206] scsi_sense_cache 8KB 8KB [ 2748.838579] sd_ext_cdb 3KB 3KB [ 2748.839960] virtio_scsi_cmd 16KB 16KB [ 2748.841359] sgpool-128 59KB 59KB [ 2748.842739] sgpool-64 63KB 63KB [ 2748.844108] sgpool-32 157KB 157KB [ 2748.845465] sgpool-16 82KB 82KB [ 2748.846851] sgpool-8 75KB 75KB [ 2748.848054] io_kiocb 45KB 60KB [ 2748.849223] mqueue_inode_cache 62KB 62KB [ 2748.850254] nfs_commit_data 15KB 15KB [ 2748.851802] nfs_write_data 47KB 47KB [ 2748.853340] jbd2_inode 7KB 7KB [ 2748.854866] ext4_system_zone 7KB 7KB [ 2748.856400] ext4_io_end_vec 7KB 7KB [ 2748.857904] ext4_bio_post_read_ctx 15KB 15KB [ 2748.858685] kioctx 31KB 31KB [ 2748.859430] aio_kiocb 7KB 7KB [ 2748.860153] dio 30KB 30KB [ 2748.860765] bio-2 4KB 4KB [ 2748.861492] fasync_cache 7KB 7KB [ 2748.862221] pid_namespace 7KB 7KB [ 2748.862811] posix_timers_cache 15KB 15KB [ 2748.863550] rpc_buffers 31KB 31KB [ 2748.864259] rpc_tasks 3KB 3KB [ 2748.864861] UNIX 416KB 416KB [ 2748.865589] UDP-Lite 31KB 31KB [ 2748.866324] tcp_bind_bucket 8KB 8KB [ 2748.867265] xfrm_state 112KB 112KB [ 2748.868566] oom_reaper: reaped process 14396 (syz-executor.7), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2748.871096] ip_fib_trie 8KB 8KB [ 2748.872482] ip_fib_alias 19KB 19KB [ 2748.873895] ip_dst_cache 40KB 60KB [ 2748.875291] PING 62KB 62KB [ 2748.876886] RAW 93KB 93KB [ 2748.878340] UDP 222KB 315KB [ 2748.879712] tw_sock_TCP 7KB 7KB [ 2748.881091] request_sock_TCP 15KB 15KB [ 2748.882502] TCP 60KB 60KB [ 2748.883926] hugetlbfs_inode_cache 30KB 30KB [ 2748.885455] bio-1 11KB 11KB [ 2748.886868] eventpoll_pwq 23KB 23KB [ 2748.888286] eventpoll_epi 47KB 47KB [ 2748.889716] inotify_inode_mark 46KB 46KB [ 2748.891169] request_queue 60KB 60KB [ 2748.892581] blkdev_ioc 60KB 60KB [ 2748.894044] bio-0 264KB 264KB [ 2748.895447] biovec-max 841KB 841KB [ 2748.896869] biovec-128 63KB 63KB [ 2748.898286] biovec-64 299KB 299KB [ 2748.899695] biovec-16 60KB 60KB [ 2748.901106] user_namespace 31KB 31KB [ 2748.902527] uid_cache 8KB 8KB [ 2748.903964] dmaengine-unmap-2 4KB 4KB [ 2748.905395] audit_buffer 7KB 7KB [ 2748.906818] skbuff_fclone_cache 127KB 127KB [ 2748.908287] skbuff_head_cache 510KB 510KB [ 2748.909757] file_lock_cache 47KB 47KB [ 2748.911012] file_lock_ctx 7KB 7KB [ 2748.912258] fsnotify_mark_connector 24KB 24KB [ 2748.913784] net_namespace 115KB 115KB [ 2748.915155] task_delay_info 146KB 146KB [ 2748.916494] taskstats 84KB 84KB [ 2748.917863] proc_dir_entry 361KB 375KB [ 2748.919209] pde_opener 31KB 31KB [ 2748.920554] seq_file 86KB 86KB [ 2748.921899] sigqueue 110KB 110KB [ 2748.923234] shmem_inode_cache 1289KB 1289KB [ 2748.924594] kernfs_iattrs_cache 250KB 250KB [ 2748.926043] kernfs_node_cache 5221KB 5268KB [ 2748.927396] mnt_cache 199KB 212KB [ 2748.928750] filp 2082KB 2265KB [ 2748.930112] names_cache 14577KB 16184KB [ 2748.931458] hashtab_node 274KB 274KB [ 2748.932802] ebitmap_node 1149KB 1149KB [ 2748.934178] avtab_node 4976KB 4976KB [ 2748.935522] avc_node 35KB 35KB [ 2748.936894] lsm_inode_cache 2674KB 2960KB [ 2748.938245] lsm_file_cache 188KB 196KB [ 2748.939609] key_jar 31KB 31KB [ 2748.941002] uts_namespace 15KB 15KB [ 2748.942348] nsproxy 7KB 7KB [ 2748.943687] vm_area_struct 1512KB 1512KB [ 2748.945031] mm_struct 409KB 567KB [ 2748.946365] fs_cache 79KB 100KB [ 2748.947688] files_cache 297KB 398KB [ 2748.949035] signal_cache 318KB 524KB [ 2748.950381] sighand_cache 286KB 360KB [ 2748.951737] task_struct 1588KB 1916KB [ 2748.953096] cred_jar 152KB 196KB [ 2748.954447] anon_vma_chain 406KB 492KB [ 2748.955800] anon_vma 255KB 270KB [ 2748.957204] pid 104KB 108KB [ 2748.958627] Acpi-Operand 88KB 122KB [ 2748.960068] Acpi-ParseExt 31KB 31KB [ 2748.961503] Acpi-Parse 158KB 173KB [ 2748.962919] Acpi-State 82KB 98KB [ 2748.964359] Acpi-Namespace 24KB 24KB [ 2748.965764] shared_policy_node 4KB 4KB [ 2748.967203] numa_policy 7KB 7KB [ 2748.968620] trace_event_file 163KB 163KB [ 2748.970043] ftrace_event_field 280KB 280KB [ 2748.971467] pool_workqueue 40KB 40KB [ 2748.972885] task_group 16KB 16KB [ 2748.974303] vmap_area 85KB 102KB [ 2748.975708] page->ptl 354KB 378KB [ 2748.977127] kmemleak_scan_area 41KB 55KB [ 2748.979204] kmemleak_object 136617KB 147083KB [ 2748.980629] kmalloc-8k 4688KB 4864KB [ 2748.982064] kmalloc-4k 8280KB 8800KB [ 2748.983479] kmalloc-2k 4464KB 4736KB [ 2748.984894] kmalloc-1k 2436KB 3680KB [ 2748.986329] kmalloc-512 3352KB 3760KB [ 2748.987743] kmalloc-256 1239KB 1296KB [ 2748.989159] kmalloc-192 371KB 520KB [ 2748.990574] kmalloc-128 561KB 596KB [ 2748.992017] kmalloc-96 391KB 596KB [ 2748.993464] kmalloc-64 1085KB 1240KB [ 2748.994877] kmalloc-32 871KB 952KB [ 2748.996299] kmalloc-16 376KB 376KB [ 2748.997712] kmalloc-8 302KB 330KB [ 2748.999136] kmem_cache_node 47KB 47KB [ 2749.000544] kmem_cache 75KB 75KB [ 2749.001990] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz7,mems_allowed=0,global_oom,task_memcg=/syz7,task=syz-executor.7,pid=291,uid=0 [ 2749.005449] Out of memory (oom_kill_allocating_task): Killed process 291 (syz-executor.7) total-vm:93280kB, anon-rss:392kB, file-rss:34804kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:0 [ 2749.054463] in:imklog invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2749.055562] CPU: 1 PID: 13630 Comm: in:imklog Not tainted 5.10.184 #1 [ 2749.056272] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2749.057175] Call Trace: [ 2749.057476] dump_stack+0x107/0x167 [ 2749.057881] dump_header+0x106/0x65e [ 2749.058296] oom_kill_process.cold+0x10/0x15 [ 2749.058781] out_of_memory+0x1149/0x1440 [ 2749.059238] ? oom_killer_disable+0x280/0x280 [ 2749.059732] ? mutex_trylock+0x237/0x2b0 [ 2749.060200] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2749.060848] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2749.061505] ? lock_acquire+0xd7/0x470 [ 2749.061938] ? warn_alloc+0x190/0x190 [ 2749.062387] __alloc_pages_nodemask+0x51d/0x600 [ 2749.062908] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2749.063577] ? find_get_entry+0x2c8/0x740 [ 2749.064038] alloc_pages_current+0x187/0x280 [ 2749.064532] __page_cache_alloc+0x2d2/0x360 [ 2749.064996] pagecache_get_page+0x2c7/0xc80 [ 2749.065485] filemap_fault+0x177d/0x2210 [ 2749.065941] ? read_cache_page_gfp+0x30/0x30 [ 2749.066441] ? replace_page_cache_page+0x1200/0x1200 [ 2749.066998] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2749.067581] ext4_filemap_fault+0x87/0xc0 [ 2749.068036] __do_fault+0x113/0x410 [ 2749.068441] handle_mm_fault+0x1e72/0x3520 [ 2749.068905] ? find_held_lock+0x2c/0x110 [ 2749.069353] ? __pmd_alloc+0x5e0/0x5e0 [ 2749.069775] ? vmacache_find+0x55/0x2a0 [ 2749.070227] do_user_addr_fault+0x56e/0xc60 [ 2749.070691] exc_page_fault+0xa2/0x1a0 [ 2749.071110] ? asm_exc_page_fault+0x8/0x30 [ 2749.071558] asm_exc_page_fault+0x1e/0x30 [ 2749.072001] RIP: 0033:0x558c1ded9360 [ 2749.072403] Code: Unable to access opcode bytes at RIP 0x558c1ded9336. [ 2749.073103] RSP: 002b:00007f95284bb3b8 EFLAGS: 00010206 [ 2749.073673] RAX: 0000000000000000 RBX: 00007f95284bb418 RCX: 00007f95284bbd02 [ 2749.074444] RDX: 000000000000003e RSI: 000000000000003e RDI: 0000000000000270 [ 2749.075200] RBP: 00007f95284bb418 R08: 00007f9528de03c0 R09: 0000000000000000 [ 2749.075958] R10: a3d70a3d70a3d70b R11: 0000000000000000 R12: 0000558c1e5305c0 [ 2749.076729] R13: 00007f95284bbd03 R14: 0000000000000004 R15: 00007f95284bbd77 [ 2749.077622] Mem-Info: [ 2749.077898] active_anon:524 inactive_anon:55790 isolated_anon:0 [ 2749.077898] active_file:660 inactive_file:1041 isolated_file:0 [ 2749.077898] unevictable:0 dirty:15 writeback:4 [ 2749.077898] slab_reclaimable:6879 slab_unreclaimable:62649 [ 2749.077898] mapped:62345 shmem:98 pagetables:1404 bounce:0 [ 2749.077898] free:4091 free_pcp:177 free_cma:0 [ 2749.081526] Node 0 active_anon:2096kB inactive_anon:223160kB active_file:2640kB inactive_file:4164kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:249380kB dirty:60kB writeback:16kB shmem:392kB writeback_tmp:0kB kernel_stack:4192kB all_unreclaimable? no [ 2749.084367] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:12kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2749.087219] lowmem_reserve[]: 0 1616 1616 1616 [ 2749.087731] Node 0 DMA32 free:8868kB min:17744kB low:19396kB high:21048kB reserved_highatomic:2048KB active_anon:2096kB inactive_anon:223148kB active_file:2556kB inactive_file:4212kB unevictable:0kB writepending:160kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:5616kB bounce:0kB free_pcp:944kB local_pcp:476kB free_cma:0kB [ 2749.090833] lowmem_reserve[]: 0 0 0 0 [ 2749.091279] Node 0 DMA: 2*4kB (UM) 0*8kB 1*16kB (M) 2*32kB (UM) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6488kB [ 2749.092868] Node 0 DMA32: 881*4kB (UM) 325*8kB (UM) 56*16kB (UM) 1*32kB (H) 1*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 9036kB [ 2749.094560] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2749.095467] 1774 total pagecache pages [ 2749.095870] 0 pages in swap cache [ 2749.096275] Swap cache stats: add 0, delete 0, find 0/0 [ 2749.096827] Free swap = 0kB [ 2749.097172] Total swap = 0kB [ 2749.097494] 524158 pages RAM [ 2749.097825] 0 pages HighMem/MovableOnly [ 2749.098274] 105055 pages reserved [ 2749.098640] Unreclaimable slab info: [ 2749.099055] Name Used Total [ 2749.099635] pid_3 7KB 7KB [ 2749.100232] pid_2 93KB 93KB [ 2749.100793] IEEE-802.15.4-MAC 63KB 63KB [ 2749.101380] IEEE-802.15.4-RAW 31KB 31KB [ 2749.101966] p9_req_t 8KB 8KB [ 2749.102542] ip6-frags 15KB 15KB [ 2749.103131] fib6_nodes 28KB 28KB [ 2749.103690] ip6_dst_cache 37KB 37KB [ 2749.104267] PINGv6 63KB 63KB [ 2749.104836] RAWv6 378KB 378KB [ 2749.105420] UDPLITEv6 62KB 62KB [ 2749.105991] UDPv6 62KB 62KB [ 2749.106564] tw_sock_TCPv6 15KB 15KB [ 2749.107143] request_sock_TCPv6 15KB 15KB [ 2749.107708] TCPv6 62KB 62KB [ 2749.108312] scsi_sense_cache 8KB 8KB [ 2749.108867] sd_ext_cdb 3KB 3KB [ 2749.109454] virtio_scsi_cmd 16KB 16KB [ 2749.110034] sgpool-128 59KB 59KB [ 2749.110597] sgpool-64 63KB 63KB [ 2749.111188] sgpool-32 189KB 189KB [ 2749.111740] sgpool-16 82KB 82KB [ 2749.112314] sgpool-8 75KB 75KB [ 2749.112880] io_kiocb 45KB 60KB [ 2749.113470] mqueue_inode_cache 62KB 62KB [ 2749.114060] nfs_commit_data 15KB 15KB [ 2749.114619] nfs_write_data 47KB 47KB [ 2749.115219] jbd2_inode 7KB 7KB [ 2749.115773] ext4_system_zone 7KB 7KB [ 2749.116358] ext4_io_end_vec 7KB 7KB [ 2749.116909] ext4_bio_post_read_ctx 15KB 15KB [ 2749.117539] kioctx 31KB 31KB [ 2749.118127] aio_kiocb 7KB 7KB [ 2749.118681] dio 30KB 30KB [ 2749.119266] bio-2 4KB 4KB [ 2749.119818] fasync_cache 7KB 7KB [ 2749.120408] pid_namespace 7KB 7KB [ 2749.120980] posix_timers_cache 15KB 15KB [ 2749.121566] rpc_buffers 31KB 31KB [ 2749.122161] rpc_tasks 3KB 3KB [ 2749.122712] UNIX 416KB 416KB [ 2749.123314] UDP-Lite 31KB 31KB [ 2749.123876] tcp_bind_bucket 8KB 8KB [ 2749.124462] xfrm_state 112KB 112KB [ 2749.125041] ip_fib_trie 8KB 8KB [ 2749.125620] ip_fib_alias 19KB 19KB [ 2749.126207] ip_dst_cache 40KB 60KB [ 2749.126758] PING 62KB 62KB [ 2749.127336] RAW 93KB 93KB [ 2749.127897] UDP 222KB 315KB [ 2749.128473] tw_sock_TCP 7KB 7KB [ 2749.129039] request_sock_TCP 15KB 15KB [ 2749.129607] TCP 60KB 60KB [ 2749.130198] hugetlbfs_inode_cache 30KB 30KB [ 2749.130792] bio-1 11KB 11KB [ 2749.131374] eventpoll_pwq 23KB 23KB [ 2749.131946] eventpoll_epi 47KB 47KB [ 2749.132511] inotify_inode_mark 46KB 46KB [ 2749.133102] request_queue 60KB 60KB [ 2749.133676] blkdev_ioc 60KB 60KB [ 2749.134259] bio-0 288KB 288KB [ 2749.134818] biovec-max 1049KB 1049KB [ 2749.135389] biovec-128 63KB 63KB [ 2749.135966] biovec-64 315KB 315KB [ 2749.136539] biovec-16 60KB 60KB [ 2749.137124] user_namespace 31KB 31KB [ 2749.137689] uid_cache 8KB 8KB [ 2749.138277] dmaengine-unmap-2 4KB 4KB [ 2749.138838] audit_buffer 7KB 7KB [ 2749.139419] skbuff_fclone_cache 127KB 127KB [ 2749.140000] skbuff_head_cache 510KB 510KB [ 2749.140566] file_lock_cache 47KB 47KB [ 2749.141139] file_lock_ctx 7KB 7KB [ 2749.141708] fsnotify_mark_connector 24KB 24KB [ 2749.142345] net_namespace 115KB 115KB [ 2749.142899] task_delay_info 146KB 146KB [ 2749.143475] taskstats 84KB 84KB [ 2749.144050] proc_dir_entry 361KB 375KB [ 2749.144615] pde_opener 31KB 31KB [ 2749.145191] seq_file 86KB 86KB [ 2749.145751] sigqueue 110KB 110KB [ 2749.146333] shmem_inode_cache 1289KB 1289KB [ 2749.146888] kernfs_iattrs_cache 250KB 250KB [ 2749.147502] kernfs_node_cache 5221KB 5268KB [ 2749.148081] mnt_cache 199KB 212KB [ 2749.148648] filp 1938KB 2190KB [ 2749.149239] names_cache 14458KB 16005KB [ 2749.149811] hashtab_node 274KB 274KB [ 2749.150396] ebitmap_node 1149KB 1149KB [ 2749.150976] avtab_node 4976KB 4976KB [ 2749.151544] avc_node 35KB 35KB [ 2749.152150] lsm_inode_cache 2674KB 2960KB [ 2749.152703] lsm_file_cache 188KB 196KB [ 2749.153277] key_jar 31KB 31KB [ 2749.153846] uts_namespace 15KB 15KB [ 2749.154435] nsproxy 7KB 7KB [ 2749.155000] vm_area_struct 1512KB 1512KB [ 2749.155558] mm_struct 409KB 567KB [ 2749.156131] fs_cache 79KB 100KB [ 2749.156684] files_cache 297KB 398KB [ 2749.157269] signal_cache 318KB 524KB [ 2749.157843] sighand_cache 286KB 360KB [ 2749.158432] task_struct 1588KB 1916KB [ 2749.159003] cred_jar 152KB 196KB [ 2749.159569] anon_vma_chain 406KB 492KB [ 2749.160148] anon_vma 255KB 270KB [ 2749.160710] pid 104KB 108KB [ 2749.161284] Acpi-Operand 88KB 122KB [ 2749.161845] Acpi-ParseExt 31KB 31KB [ 2749.162437] Acpi-Parse 158KB 173KB [ 2749.163010] Acpi-State 82KB 98KB [ 2749.163568] Acpi-Namespace 24KB 24KB [ 2749.164153] shared_policy_node 4KB 4KB [ 2749.164717] numa_policy 7KB 7KB [ 2749.165313] trace_event_file 163KB 163KB [ 2749.165907] ftrace_event_field 280KB 280KB [ 2749.166506] pool_workqueue 40KB 40KB [ 2749.167094] task_group 16KB 16KB [ 2749.167653] vmap_area 85KB 102KB [ 2749.168243] page->ptl 354KB 378KB [ 2749.168805] kmemleak_scan_area 41KB 55KB [ 2749.169823] kmemleak_object 136296KB 147083KB [ 2749.170434] kmalloc-8k 4688KB 4864KB [ 2749.171024] kmalloc-4k 8272KB 8800KB [ 2749.171594] kmalloc-2k 4464KB 4736KB [ 2749.172186] kmalloc-1k 2436KB 3680KB [ 2749.172746] kmalloc-512 3354KB 3760KB [ 2749.173333] kmalloc-256 1239KB 1296KB [ 2749.173915] kmalloc-192 371KB 520KB [ 2749.174506] kmalloc-128 561KB 596KB [ 2749.175087] kmalloc-96 391KB 596KB [ 2749.175659] kmalloc-64 1084KB 1240KB [ 2749.176244] kmalloc-32 870KB 952KB [ 2749.176797] kmalloc-16 376KB 376KB [ 2749.177377] kmalloc-8 302KB 330KB [ 2749.177956] kmem_cache_node 47KB 47KB [ 2749.178528] kmem_cache 75KB 75KB [ 2749.179111] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/rsyslog.service,task=in:imklog,pid=13630,uid=0 [ 2749.180795] Out of memory (oom_kill_allocating_task): Killed process 13628 (rsyslogd) total-vm:220876kB, anon-rss:920kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 2749.198878] systemd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2749.199942] CPU: 1 PID: 1 Comm: systemd Not tainted 5.10.184 #1 [ 2749.200581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2749.201645] Call Trace: [ 2749.201935] dump_stack+0x107/0x167 [ 2749.202400] dump_header+0x106/0x65e [ 2749.202879] oom_kill_process.cold+0x10/0x15 [ 2749.203425] out_of_memory+0x358/0x1440 [ 2749.203859] ? oom_killer_disable+0x280/0x280 [ 2749.204339] ? mutex_trylock+0x237/0x2b0 [ 2749.204777] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2749.205428] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2749.206054] ? lock_acquire+0xd7/0x470 [ 2749.206483] ? warn_alloc+0x190/0x190 [ 2749.206963] __alloc_pages_nodemask+0x51d/0x600 [ 2749.207623] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2749.208473] ? find_get_entry+0x2c8/0x740 [ 2749.209069] alloc_pages_current+0x187/0x280 [ 2749.209701] __page_cache_alloc+0x2d2/0x360 [ 2749.210314] pagecache_get_page+0x2c7/0xc80 [ 2749.210930] filemap_fault+0x177d/0x2210 [ 2749.211516] ? read_cache_page_gfp+0x30/0x30 [ 2749.212140] ? replace_page_cache_page+0x1200/0x1200 [ 2749.212862] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2749.213617] ext4_filemap_fault+0x87/0xc0 [ 2749.214210] __do_fault+0x113/0x410 [ 2749.214726] handle_mm_fault+0x1e72/0x3520 [ 2749.215339] ? __pmd_alloc+0x5e0/0x5e0 [ 2749.215906] ? vmacache_find+0x55/0x2a0 [ 2749.216479] ? vmacache_update+0xce/0x140 [ 2749.217081] do_user_addr_fault+0x56e/0xc60 [ 2749.217740] exc_page_fault+0xa2/0x1a0 [ 2749.218292] ? asm_exc_page_fault+0x8/0x30 [ 2749.218894] asm_exc_page_fault+0x1e/0x30 [ 2749.219478] RIP: 0033:0x55ff8d35d160 [ 2749.220014] Code: Unable to access opcode bytes at RIP 0x55ff8d35d136. [ 2749.220944] RSP: 002b:00007fff9bc2f598 EFLAGS: 00010203 [ 2749.221707] RAX: 00007fc32029f4f7 RBX: 00007fff9bc2f5c0 RCX: 000055ff8e1d3230 [ 2749.222717] RDX: 0000000000000001 RSI: 0000000000000007 RDI: 000055ff8e1d3ad0 [ 2749.223720] RBP: 000055ff8e1d3ad0 R08: 0000000000000000 R09: 000055ff8e1d4138 [ 2749.224730] R10: 0000000000000000 R11: 00000000004e51ac R12: 00007fff9bc2f5b8 [ 2749.225748] R13: 000055ff8d994b40 R14: 0000000000000100 R15: 0000000000000000 [ 2749.226857] Mem-Info: [ 2749.227257] active_anon:524 inactive_anon:55412 isolated_anon:0 [ 2749.227257] active_file:326 inactive_file:354 isolated_file:5 [ 2749.227257] unevictable:0 dirty:15 writeback:4 [ 2749.227257] slab_reclaimable:6879 slab_unreclaimable:62649 [ 2749.227257] mapped:61484 shmem:98 pagetables:1404 bounce:0 [ 2749.227257] free:3881 free_pcp:92 free_cma:0 [ 2749.231654] Node 0 active_anon:2096kB inactive_anon:221648kB active_file:1304kB inactive_file:1416kB unevictable:0kB isolated(anon):0kB isolated(file):20kB mapped:245936kB dirty:60kB writeback:16kB shmem:392kB writeback_tmp:0kB kernel_stack:4096kB all_unreclaimable? no [ 2749.234943] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:12kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2749.238338] lowmem_reserve[]: 0 1616 1616 1616 [ 2749.238846] Node 0 DMA32 free:9036kB min:17744kB low:19396kB high:21048kB reserved_highatomic:2048KB active_anon:2096kB inactive_anon:222140kB active_file:2008kB inactive_file:2116kB unevictable:0kB writepending:160kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:5616kB bounce:0kB free_pcp:396kB local_pcp:84kB free_cma:0kB [ 2749.241933] lowmem_reserve[]: 0 0 0 0 [ 2749.242367] Node 0 DMA: 2*4kB (UM) 0*8kB 1*16kB (M) 2*32kB (UM) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6488kB [ 2749.243991] Node 0 DMA32: 1026*4kB (UM) 281*8kB (UM) 39*16kB (UM) 1*32kB (H) 1*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 8992kB [ 2749.245688] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2749.246589] 808 total pagecache pages [ 2749.247002] 0 pages in swap cache [ 2749.247366] Swap cache stats: add 0, delete 0, find 0/0 [ 2749.247958] Free swap = 0kB [ 2749.248274] Total swap = 0kB [ 2749.248600] 524158 pages RAM [ 2749.248932] 0 pages HighMem/MovableOnly [ 2749.249348] 105055 pages reserved [ 2749.249736] Unreclaimable slab info: [ 2749.250143] Name Used Total [ 2749.250733] pid_3 7KB 7KB [ 2749.251302] pid_2 93KB 93KB [ 2749.251875] IEEE-802.15.4-MAC 63KB 63KB [ 2749.252445] IEEE-802.15.4-RAW 31KB 31KB [ 2749.253033] p9_req_t 8KB 8KB [ 2749.253604] ip6-frags 15KB 15KB [ 2749.254193] fib6_nodes 28KB 28KB [ 2749.254751] ip6_dst_cache 37KB 37KB [ 2749.255335] PINGv6 63KB 63KB [ 2749.255891] RAWv6 378KB 378KB [ 2749.256468] UDPLITEv6 62KB 62KB [ 2749.257041] UDPv6 62KB 62KB [ 2749.257607] tw_sock_TCPv6 15KB 15KB [ 2749.258175] request_sock_TCPv6 15KB 15KB [ 2749.258737] TCPv6 62KB 62KB [ 2749.259317] scsi_sense_cache 8KB 8KB [ 2749.259877] sd_ext_cdb 3KB 3KB [ 2749.260445] virtio_scsi_cmd 16KB 16KB [ 2749.261018] sgpool-128 59KB 59KB [ 2749.261589] sgpool-64 63KB 63KB [ 2749.262159] sgpool-32 189KB 189KB [ 2749.262838] sgpool-16 82KB 82KB [ 2749.263430] sgpool-8 75KB 75KB [ 2749.264002] io_kiocb 45KB 60KB [ 2749.264558] mqueue_inode_cache 62KB 62KB [ 2749.265140] nfs_commit_data 15KB 15KB [ 2749.265711] nfs_write_data 47KB 47KB [ 2749.266279] jbd2_inode 7KB 7KB [ 2749.266840] ext4_system_zone 7KB 7KB [ 2749.267414] ext4_io_end_vec 7KB 7KB [ 2749.267980] ext4_bio_post_read_ctx 15KB 15KB [ 2749.268594] kioctx 31KB 31KB [ 2749.269164] aio_kiocb 7KB 7KB [ 2749.269741] dio 30KB 30KB [ 2749.270309] bio-2 4KB 4KB [ 2749.270862] fasync_cache 7KB 7KB [ 2749.271433] pid_namespace 7KB 7KB [ 2749.272006] posix_timers_cache 15KB 15KB [ 2749.272567] rpc_buffers 31KB 31KB [ 2749.273138] rpc_tasks 3KB 3KB [ 2749.273710] UNIX 416KB 416KB [ 2749.274277] UDP-Lite 31KB 31KB [ 2749.274840] tcp_bind_bucket 8KB 8KB [ 2749.275417] xfrm_state 112KB 112KB [ 2749.275984] ip_fib_trie 8KB 8KB [ 2749.276536] ip_fib_alias 19KB 19KB [ 2749.277104] ip_dst_cache 40KB 60KB [ 2749.277665] PING 62KB 62KB [ 2749.278244] RAW 93KB 93KB [ 2749.278808] UDP 222KB 315KB [ 2749.279375] tw_sock_TCP 7KB 7KB [ 2749.279944] request_sock_TCP 15KB 15KB [ 2749.280497] TCP 60KB 60KB [ 2749.281075] hugetlbfs_inode_cache 30KB 30KB [ 2749.281672] bio-1 11KB 11KB [ 2749.282254] eventpoll_pwq 23KB 23KB [ 2749.282810] eventpoll_epi 47KB 47KB [ 2749.283377] inotify_inode_mark 46KB 46KB [ 2749.283956] request_queue 60KB 60KB [ 2749.284514] blkdev_ioc 60KB 60KB [ 2749.285077] bio-0 288KB 288KB [ 2749.285635] biovec-max 1049KB 1049KB [ 2749.286204] biovec-128 63KB 63KB [ 2749.286763] biovec-64 315KB 315KB [ 2749.287335] biovec-16 60KB 60KB [ 2749.287896] user_namespace 31KB 31KB [ 2749.288466] uid_cache 8KB 8KB [ 2749.289031] dmaengine-unmap-2 4KB 4KB [ 2749.289603] audit_buffer 7KB 7KB [ 2749.290179] skbuff_fclone_cache 127KB 127KB [ 2749.290761] skbuff_head_cache 510KB 510KB [ 2749.291334] file_lock_cache 47KB 47KB [ 2749.291887] file_lock_ctx 7KB 7KB [ 2749.292453] fsnotify_mark_connector 24KB 24KB [ 2749.293083] net_namespace 115KB 115KB [ 2749.293645] task_delay_info 146KB 146KB [ 2749.294229] taskstats 84KB 84KB [ 2749.294785] proc_dir_entry 361KB 375KB [ 2749.295353] pde_opener 31KB 31KB [ 2749.295911] seq_file 86KB 86KB [ 2749.296482] sigqueue 110KB 110KB [ 2749.297062] shmem_inode_cache 1289KB 1289KB [ 2749.297625] kernfs_iattrs_cache 250KB 250KB [ 2749.298216] kernfs_node_cache 5221KB 5268KB [ 2749.298772] mnt_cache 199KB 212KB [ 2749.299361] filp 1938KB 2190KB [ 2749.299955] names_cache 14458KB 16005KB [ 2749.300506] hashtab_node 274KB 274KB [ 2749.301069] ebitmap_node 1149KB 1149KB [ 2749.301636] avtab_node 4976KB 4976KB [ 2749.302209] avc_node 35KB 35KB [ 2749.302781] lsm_inode_cache 2674KB 2960KB [ 2749.303352] lsm_file_cache 188KB 196KB [ 2749.303909] key_jar 31KB 31KB [ 2749.304477] uts_namespace 15KB 15KB [ 2749.305045] nsproxy 7KB 7KB [ 2749.305603] vm_area_struct 1512KB 1512KB [ 2749.306181] mm_struct 409KB 567KB [ 2749.306734] fs_cache 79KB 100KB [ 2749.307300] files_cache 297KB 398KB [ 2749.307857] signal_cache 318KB 524KB [ 2749.308435] sighand_cache 286KB 360KB [ 2749.309006] task_struct 1588KB 1916KB [ 2749.309579] cred_jar 152KB 196KB [ 2749.310179] anon_vma_chain 406KB 492KB [ 2749.310738] anon_vma 253KB 266KB [ 2749.311303] pid 104KB 108KB [ 2749.311858] Acpi-Operand 88KB 122KB [ 2749.312431] Acpi-ParseExt 31KB 31KB [ 2749.312996] Acpi-Parse 158KB 173KB [ 2749.313566] Acpi-State 82KB 98KB [ 2749.314157] Acpi-Namespace 24KB 24KB [ 2749.314854] shared_policy_node 4KB 4KB [ 2749.315433] numa_policy 7KB 7KB [ 2749.316005] trace_event_file 163KB 163KB [ 2749.316566] ftrace_event_field 280KB 280KB [ 2749.317254] pool_workqueue 40KB 40KB [ 2749.317825] task_group 16KB 16KB [ 2749.318401] vmap_area 85KB 102KB [ 2749.318972] page->ptl 354KB 378KB [ 2749.319537] kmemleak_scan_area 41KB 55KB [ 2749.320572] kmemleak_object 136309KB 147083KB [ 2749.321259] kmalloc-8k 4688KB 4864KB [ 2749.321832] kmalloc-4k 8272KB 8800KB [ 2749.322455] kmalloc-2k 4464KB 4736KB [ 2749.323135] kmalloc-1k 2436KB 3680KB [ 2749.323744] kmalloc-512 3363KB 3760KB [ 2749.324318] kmalloc-256 1239KB 1296KB [ 2749.324882] kmalloc-192 371KB 520KB [ 2749.325478] kmalloc-128 561KB 596KB [ 2749.326064] kmalloc-96 391KB 596KB [ 2749.326625] kmalloc-64 1084KB 1240KB [ 2749.327198] kmalloc-32 870KB 952KB [ 2749.327750] kmalloc-16 376KB 376KB [ 2749.328318] kmalloc-8 302KB 330KB [ 2749.328892] kmem_cache_node 47KB 47KB [ 2749.329553] kmem_cache 75KB 75KB [ 2749.330120] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/syz5,task=syz-executor.5,pid=14392,uid=0 [ 2749.331710] Out of memory: Killed process 14431 (syz-executor.5) total-vm:93940kB, anon-rss:476kB, file-rss:34820kB, shmem-rss:0kB, UID:0 pgtables:136kB oom_score_adj:1000 [ 2749.641030] sshd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2749.643349] CPU: 0 PID: 248 Comm: sshd Not tainted 5.10.184 #1 [ 2749.644694] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2749.646594] Call Trace: [ 2749.647204] dump_stack+0x107/0x167 [ 2749.648043] dump_header+0x106/0x65e [ 2749.648905] oom_kill_process.cold+0x10/0x15 [ 2749.649937] out_of_memory+0x1149/0x1440 [ 2749.650872] ? oom_killer_disable+0x280/0x280 [ 2749.651898] ? mutex_trylock+0x237/0x2b0 [ 2749.652829] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2749.654192] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2749.655542] ? lock_acquire+0xd7/0x470 [ 2749.656438] ? warn_alloc+0x190/0x190 [ 2749.657337] __alloc_pages_nodemask+0x51d/0x600 [ 2749.658425] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2749.659798] ? find_get_entry+0x2c8/0x740 [ 2749.660757] alloc_pages_current+0x187/0x280 [ 2749.661771] __page_cache_alloc+0x2d2/0x360 [ 2749.662764] pagecache_get_page+0x2c7/0xc80 [ 2749.663756] filemap_fault+0x177d/0x2210 [ 2749.664697] ? read_cache_page_gfp+0x30/0x30 [ 2749.665711] ? handle_mm_fault+0x28d0/0x3520 [ 2749.666716] ? lock_downgrade+0x6d0/0x6d0 [ 2749.667668] ext4_filemap_fault+0x87/0xc0 [ 2749.668629] __do_fault+0x113/0x410 [ 2749.669479] handle_mm_fault+0x1e72/0x3520 [ 2749.670445] ? find_held_lock+0x2c/0x110 [ 2749.671369] ? __pmd_alloc+0x5e0/0x5e0 [ 2749.672269] ? vmacache_find+0x55/0x2a0 [ 2749.673194] do_user_addr_fault+0x56e/0xc60 [ 2749.674196] exc_page_fault+0xa2/0x1a0 [ 2749.675086] ? asm_exc_page_fault+0x8/0x30 [ 2749.676048] asm_exc_page_fault+0x1e/0x30 [ 2749.676986] RIP: 0033:0x55a2160fc720 [ 2749.677849] Code: Unable to access opcode bytes at RIP 0x55a2160fc6f6. [ 2749.679345] RSP: 002b:00007ffc7af28008 EFLAGS: 00010246 [ 2749.680563] RAX: 00007ffc7af28110 RBX: 0000000000000008 RCX: 000000000000000e [ 2749.682192] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 000055a21641ec20 [ 2749.683807] RBP: 0000000000000000 R08: 00007ffc7af28114 R09: 00007ffc7af28128 [ 2749.685432] R10: 000000000000000a R11: 0000000000000246 R12: 000055a216423ec0 [ 2749.687057] R13: 00007ffc7af28118 R14: 0000000000000050 R15: 0000000000000008 [ 2749.689087] Mem-Info: [ 2749.689704] active_anon:522 inactive_anon:55329 isolated_anon:0 [ 2749.689704] active_file:24 inactive_file:14 isolated_file:0 [ 2749.689704] unevictable:0 dirty:0 writeback:0 [ 2749.689704] slab_reclaimable:6880 slab_unreclaimable:62615 [ 2749.689704] mapped:60945 shmem:97 pagetables:1267 bounce:0 [ 2749.689704] free:3369 free_pcp:0 free_cma:0 [ 2749.696761] Node 0 active_anon:2088kB inactive_anon:221316kB active_file:96kB inactive_file:56kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:243780kB dirty:0kB writeback:0kB shmem:388kB writeback_tmp:0kB kernel_stack:3904kB all_unreclaimable? no [ 2749.701995] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:12kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2749.707909] lowmem_reserve[]: 0 1616 1616 1616 [ 2749.709063] Node 0 DMA32 free:6988kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:2088kB inactive_anon:221472kB active_file:264kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:5068kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2749.715482] lowmem_reserve[]: 0 0 0 0 [ 2749.716418] Node 0 DMA: 2*4kB (UM) 0*8kB 1*16kB (M) 2*32kB (UM) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6488kB [ 2749.719832] Node 0 DMA32: 1022*4kB (UM) 150*8kB (UM) 0*16kB 1*32kB (H) 1*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 7304kB [ 2749.723241] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2749.725183] 158 total pagecache pages [ 2749.726080] 0 pages in swap cache [ 2749.726853] Swap cache stats: add 0, delete 0, find 0/0 [ 2749.728305] Free swap = 0kB [ 2749.729035] Total swap = 0kB [ 2749.729737] 524158 pages RAM [ 2749.730460] 0 pages HighMem/MovableOnly [ 2749.731390] 105055 pages reserved [ 2749.732201] Unreclaimable slab info: [ 2749.733077] Name Used Total [ 2749.734372] pid_3 7KB 7KB [ 2749.735609] pid_2 93KB 93KB [ 2749.736851] IEEE-802.15.4-MAC 63KB 63KB [ 2749.738103] IEEE-802.15.4-RAW 31KB 31KB [ 2749.739338] p9_req_t 8KB 8KB [ 2749.740593] ip6-frags 15KB 15KB [ 2749.741864] fib6_nodes 28KB 28KB [ 2749.743104] ip6_dst_cache 37KB 37KB [ 2749.744347] PINGv6 63KB 63KB [ 2749.745596] RAWv6 378KB 378KB [ 2749.746842] UDPLITEv6 62KB 62KB [ 2749.748093] UDPv6 62KB 62KB [ 2749.749330] tw_sock_TCPv6 15KB 15KB [ 2749.750585] request_sock_TCPv6 15KB 15KB [ 2749.751991] TCPv6 62KB 62KB [ 2749.753241] scsi_sense_cache 8KB 8KB [ 2749.754502] sd_ext_cdb 3KB 3KB [ 2749.755764] virtio_scsi_cmd 16KB 16KB [ 2749.757019] sgpool-128 59KB 59KB [ 2749.758268] sgpool-64 63KB 63KB [ 2749.759505] sgpool-32 299KB 299KB [ 2749.760742] sgpool-16 97KB 97KB [ 2749.761987] sgpool-8 75KB 75KB [ 2749.763227] io_kiocb 45KB 60KB [ 2749.764469] mqueue_inode_cache 62KB 62KB [ 2749.765740] nfs_commit_data 15KB 15KB [ 2749.766977] nfs_write_data 47KB 47KB [ 2749.768220] jbd2_inode 7KB 7KB [ 2749.769480] ext4_system_zone 7KB 7KB [ 2749.770720] ext4_io_end_vec 7KB 7KB [ 2749.771959] ext4_bio_post_read_ctx 15KB 15KB [ 2749.773296] kioctx 31KB 31KB [ 2749.774552] aio_kiocb 7KB 7KB [ 2749.775793] dio 30KB 30KB [ 2749.777037] bio-2 4KB 4KB [ 2749.778354] fasync_cache 7KB 7KB [ 2749.779741] pid_namespace 7KB 7KB [ 2749.781020] posix_timers_cache 15KB 15KB [ 2749.782316] rpc_buffers 31KB 31KB [ 2749.783705] rpc_tasks 3KB 3KB [ 2749.785076] UNIX 416KB 416KB [ 2749.786362] UDP-Lite 31KB 31KB [ 2749.787679] tcp_bind_bucket 8KB 8KB [ 2749.788955] xfrm_state 112KB 112KB [ 2749.790287] ip_fib_trie 8KB 8KB [ 2749.791472] ip_fib_alias 19KB 19KB [ 2749.792660] ip_dst_cache 40KB 60KB [ 2749.793849] PING 62KB 62KB [ 2749.795019] RAW 93KB 93KB [ 2749.796213] UDP 222KB 315KB [ 2749.797385] tw_sock_TCP 7KB 7KB [ 2749.798571] request_sock_TCP 15KB 15KB [ 2749.799759] TCP 60KB 60KB [ 2749.800955] hugetlbfs_inode_cache 30KB 30KB [ 2749.802226] bio-1 11KB 11KB [ 2749.803397] eventpoll_pwq 23KB 23KB [ 2749.804563] eventpoll_epi 47KB 47KB [ 2749.805763] inotify_inode_mark 46KB 46KB [ 2749.806961] request_queue 60KB 60KB [ 2749.808135] blkdev_ioc 60KB 60KB [ 2749.809307] bio-0 336KB 336KB [ 2749.810489] biovec-max 1049KB 1049KB [ 2749.811666] biovec-128 63KB 63KB [ 2749.812846] biovec-64 425KB 425KB [ 2749.814021] biovec-16 71KB 71KB [ 2749.815194] user_namespace 31KB 31KB [ 2749.816356] uid_cache 8KB 8KB [ 2749.817554] dmaengine-unmap-2 4KB 4KB [ 2749.818731] audit_buffer 7KB 7KB [ 2749.819900] skbuff_fclone_cache 127KB 127KB [ 2749.821099] skbuff_head_cache 510KB 510KB [ 2749.822357] file_lock_cache 47KB 47KB [ 2749.823519] file_lock_ctx 7KB 7KB [ 2749.824663] fsnotify_mark_connector 24KB 24KB [ 2749.825960] net_namespace 115KB 115KB [ 2749.827126] task_delay_info 146KB 146KB [ 2749.828306] taskstats 84KB 84KB [ 2749.829474] proc_dir_entry 361KB 375KB [ 2749.830622] pde_opener 31KB 31KB [ 2749.831789] seq_file 86KB 86KB [ 2749.832982] sigqueue 110KB 110KB [ 2749.834209] shmem_inode_cache 1253KB 1289KB [ 2749.835627] kernfs_iattrs_cache 250KB 250KB [ 2749.837058] kernfs_node_cache 5221KB 5268KB [ 2749.838461] mnt_cache 199KB 212KB [ 2749.839860] filp 1749KB 2085KB [ 2749.841270] names_cache 14156KB 15767KB [ 2749.842663] hashtab_node 274KB 274KB [ 2749.844049] ebitmap_node 1149KB 1149KB [ 2749.845435] avtab_node 4976KB 4976KB [ 2749.846855] avc_node 35KB 35KB [ 2749.848271] lsm_inode_cache 2661KB 2960KB [ 2749.849686] lsm_file_cache 188KB 196KB [ 2749.851057] key_jar 31KB 31KB [ 2749.852198] uts_namespace 15KB 15KB [ 2749.853341] nsproxy 7KB 7KB [ 2749.854488] vm_area_struct 1512KB 1512KB [ 2749.855627] mm_struct 409KB 567KB [ 2749.856764] fs_cache 79KB 100KB [ 2749.857905] files_cache 297KB 398KB [ 2749.859048] signal_cache 318KB 524KB [ 2749.860190] sighand_cache 275KB 360KB [ 2749.861331] task_struct 1555KB 1916KB [ 2749.862489] cred_jar 152KB 196KB [ 2749.863845] anon_vma_chain 406KB 492KB [ 2749.864997] anon_vma 247KB 262KB [ 2749.866135] pid 104KB 108KB [ 2749.867271] Acpi-Operand 88KB 122KB [ 2749.868418] Acpi-ParseExt 31KB 31KB [ 2749.869709] Acpi-Parse 158KB 173KB [ 2749.871021] Acpi-State 82KB 98KB [ 2749.872287] Acpi-Namespace 24KB 24KB [ 2749.873606] shared_policy_node 4KB 4KB [ 2749.874896] numa_policy 7KB 7KB [ 2749.876175] trace_event_file 163KB 163KB [ 2749.877500] ftrace_event_field 280KB 280KB [ 2749.878901] pool_workqueue 40KB 40KB [ 2749.880316] task_group 16KB 16KB [ 2749.881737] vmap_area 85KB 102KB [ 2749.883134] page->ptl 354KB 378KB [ 2749.884525] kmemleak_scan_area 41KB 55KB [ 2749.886639] kmemleak_object 135599KB 147083KB [ 2749.888066] kmalloc-8k 4688KB 4864KB [ 2749.889493] kmalloc-4k 8272KB 8800KB [ 2749.890885] kmalloc-2k 4464KB 4736KB [ 2749.892296] kmalloc-1k 2436KB 3680KB [ 2749.893709] kmalloc-512 3346KB 3760KB [ 2749.895151] kmalloc-256 1239KB 1296KB [ 2749.896555] kmalloc-192 371KB 520KB [ 2749.897986] kmalloc-128 561KB 596KB [ 2749.899392] kmalloc-96 391KB 596KB [ 2749.900802] kmalloc-64 1080KB 1240KB [ 2749.902208] kmalloc-32 870KB 952KB [ 2749.903626] kmalloc-16 376KB 376KB [ 2749.905042] kmalloc-8 302KB 330KB [ 2749.906434] kmem_cache_node 47KB 47KB [ 2749.907837] kmem_cache 75KB 75KB [ 2749.909230] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=sshd,pid=248,uid=0 [ 2749.912787] Out of memory (oom_kill_allocating_task): Killed process 248 (sshd) total-vm:13832kB, anon-rss:1280kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 2749.982480] systemd-journal invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-250 [ 2749.983696] CPU: 1 PID: 14439 Comm: systemd-journal Not tainted 5.10.184 #1 [ 2749.984452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2749.985350] Call Trace: [ 2749.985651] dump_stack+0x107/0x167 [ 2749.986041] dump_header+0x106/0x65e [ 2749.986441] oom_kill_process.cold+0x10/0x15 [ 2749.986911] out_of_memory+0x1149/0x1440 [ 2749.987347] ? oom_killer_disable+0x280/0x280 [ 2749.987800] ? mutex_trylock+0x237/0x2b0 [ 2749.988242] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2749.988831] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2749.989474] ? lock_acquire+0xd7/0x470 [ 2749.989893] ? warn_alloc+0x190/0x190 [ 2749.990291] __alloc_pages_nodemask+0x51d/0x600 [ 2749.990797] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2749.991397] ? find_get_entry+0x2c8/0x740 [ 2749.991845] alloc_pages_current+0x187/0x280 [ 2749.992285] __page_cache_alloc+0x2d2/0x360 [ 2749.992741] pagecache_get_page+0x2c7/0xc80 [ 2749.993195] filemap_fault+0x177d/0x2210 [ 2749.993650] ? read_cache_page_gfp+0x30/0x30 [ 2749.994118] ? replace_page_cache_page+0x1200/0x1200 [ 2749.994652] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2749.995216] ext4_filemap_fault+0x87/0xc0 [ 2749.995629] __do_fault+0x113/0x410 [ 2749.996023] handle_mm_fault+0x1e72/0x3520 [ 2749.996450] ? find_held_lock+0x2c/0x110 [ 2749.996885] ? __pmd_alloc+0x5e0/0x5e0 [ 2749.997289] ? vmacache_find+0x55/0x2a0 [ 2749.997730] do_user_addr_fault+0x56e/0xc60 [ 2749.998171] exc_page_fault+0xa2/0x1a0 [ 2749.998591] ? asm_exc_page_fault+0x8/0x30 [ 2749.999018] asm_exc_page_fault+0x1e/0x30 [ 2749.999463] RIP: 0033:0x7fb0f041ade2 [ 2749.999835] Code: Unable to access opcode bytes at RIP 0x7fb0f041adb8. [ 2750.000532] RSP: 002b:00007fffe25d4cb0 EFLAGS: 00010202 [ 2750.001060] RAX: 00007fb0ef929838 RBX: 0000562dfea25ea0 RCX: ffffffffffffffff [ 2750.001827] RDX: 00007fb0ef92a260 RSI: 00000000ffffffff RDI: 00007fb0f0579cf0 [ 2750.002547] RBP: 0000562dfea27528 R08: 0000562dfea30a40 R09: ffffffffffffff01 [ 2750.003297] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2750.004048] R13: 00000000fffffffa R14: 0000562dfea2dda0 R15: 00000000fffffffe [ 2750.004872] Mem-Info: [ 2750.005166] active_anon:522 inactive_anon:55329 isolated_anon:0 [ 2750.005166] active_file:21 inactive_file:16 isolated_file:0 [ 2750.005166] unevictable:0 dirty:0 writeback:0 [ 2750.005166] slab_reclaimable:6880 slab_unreclaimable:62638 [ 2750.005166] mapped:60937 shmem:97 pagetables:1267 bounce:0 [ 2750.005166] free:2691 free_pcp:62 free_cma:0 [ 2750.008455] Node 0 active_anon:2088kB inactive_anon:221316kB active_file:84kB inactive_file:64kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:243748kB dirty:0kB writeback:0kB shmem:388kB writeback_tmp:0kB kernel_stack:3904kB all_unreclaimable? yes [ 2750.010986] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:12kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2750.013775] lowmem_reserve[]: 0 1616 1616 1616 [ 2750.014292] Node 0 DMA32 free:4276kB min:11260kB low:12912kB high:14564kB reserved_highatomic:0KB active_anon:2088kB inactive_anon:221472kB active_file:188kB inactive_file:28kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:5068kB bounce:0kB free_pcp:708kB local_pcp:0kB free_cma:0kB [ 2750.017308] lowmem_reserve[]: 0 0 0 0 [ 2750.017752] Node 0 DMA: 2*4kB (UM) 0*8kB 1*16kB (M) 2*32kB (UM) 2*64kB (UM) 1*128kB (M) 2*256kB (UM) 1*512kB (M) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 6488kB [ 2750.019397] Node 0 DMA32: 854*4kB (UM) 108*8kB (UM) 2*16kB (U) 16*32kB (U) 3*64kB (U) 3*128kB (U) 3*256kB (U) 3*512kB (U) 2*1024kB (U) 2*2048kB (U) 4*4096kB (U) = 30232kB [ 2750.021111] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2750.022032] 148 total pagecache pages [ 2750.022437] 0 pages in swap cache [ 2750.022801] Swap cache stats: add 0, delete 0, find 0/0 [ 2750.023369] Free swap = 0kB [ 2750.023684] Total swap = 0kB [ 2750.024016] 524158 pages RAM [ 2750.024331] 0 pages HighMem/MovableOnly [ 2750.024745] 105055 pages reserved [ 2750.025119] Unreclaimable slab info: [ 2750.025509] Name Used Total [ 2750.026096] pid_3 7KB 7KB [ 2750.026652] pid_2 93KB 93KB [ 2750.027225] IEEE-802.15.4-MAC 63KB 63KB [ 2750.027782] IEEE-802.15.4-RAW 31KB 31KB [ 2750.028354] p9_req_t 8KB 8KB [ 2750.028909] ip6-frags 15KB 15KB [ 2750.029500] fib6_nodes 28KB 28KB [ 2750.030067] ip6_dst_cache 37KB 37KB [ 2750.030623] PINGv6 63KB 63KB [ 2750.031199] RAWv6 378KB 378KB [ 2750.031756] UDPLITEv6 62KB 62KB [ 2750.032325] UDPv6 62KB 62KB [ 2750.032880] tw_sock_TCPv6 15KB 15KB [ 2750.033456] request_sock_TCPv6 15KB 15KB [ 2750.034032] TCPv6 62KB 62KB [ 2750.034592] scsi_sense_cache 8KB 8KB [ 2750.035160] sd_ext_cdb 3KB 3KB [ 2750.035710] virtio_scsi_cmd 16KB 16KB [ 2750.036284] sgpool-128 59KB 59KB [ 2750.036839] sgpool-64 63KB 63KB [ 2750.037410] sgpool-32 330KB 330KB [ 2750.037992] sgpool-16 105KB 105KB [ 2750.038547] sgpool-8 75KB 75KB [ 2750.039117] io_kiocb 45KB 60KB [ 2750.039669] mqueue_inode_cache 62KB 62KB [ 2750.040248] nfs_commit_data 15KB 15KB [ 2750.040800] nfs_write_data 47KB 47KB [ 2750.041379] jbd2_inode 7KB 7KB [ 2750.041958] ext4_system_zone 7KB 7KB [ 2750.042511] ext4_io_end_vec 7KB 7KB [ 2750.043083] ext4_bio_post_read_ctx 15KB 15KB [ 2750.043685] kioctx 31KB 31KB [ 2750.044260] aio_kiocb 7KB 7KB [ 2750.044812] dio 30KB 30KB [ 2750.045382] bio-2 4KB 4KB [ 2750.045964] fasync_cache 7KB 7KB [ 2750.046524] pid_namespace 7KB 7KB [ 2750.047097] posix_timers_cache 15KB 15KB [ 2750.047662] rpc_buffers 31KB 31KB [ 2750.048237] rpc_tasks 3KB 3KB [ 2750.048790] UNIX 416KB 416KB [ 2750.049373] UDP-Lite 31KB 31KB [ 2750.049967] tcp_bind_bucket 8KB 8KB [ 2750.050523] xfrm_state 112KB 112KB [ 2750.051099] ip_fib_trie 8KB 8KB [ 2750.051658] ip_fib_alias 19KB 19KB [ 2750.052226] ip_dst_cache 40KB 60KB [ 2750.052782] PING 62KB 62KB [ 2750.053350] RAW 93KB 93KB [ 2750.053935] UDP 222KB 315KB [ 2750.054496] tw_sock_TCP 7KB 7KB [ 2750.055068] request_sock_TCP 15KB 15KB [ 2750.055623] TCP 60KB 60KB [ 2750.056197] hugetlbfs_inode_cache 30KB 30KB [ 2750.056784] bio-1 11KB 11KB [ 2750.057354] eventpoll_pwq 23KB 23KB [ 2750.057918] eventpoll_epi 47KB 47KB [ 2750.058494] inotify_inode_mark 46KB 46KB [ 2750.059068] request_queue 60KB 60KB [ 2750.059628] blkdev_ioc 60KB 60KB [ 2750.060197] bio-0 356KB 356KB [ 2750.060748] biovec-max 1049KB 1049KB [ 2750.061315] biovec-128 63KB 63KB [ 2750.061873] biovec-64 456KB 456KB [ 2750.062450] biovec-16 75KB 75KB [ 2750.063021] user_namespace 31KB 31KB [ 2750.063586] uid_cache 8KB 8KB [ 2750.064159] dmaengine-unmap-2 4KB 4KB [ 2750.064712] audit_buffer 7KB 7KB [ 2750.065293] skbuff_fclone_cache 127KB 127KB [ 2750.065888] skbuff_head_cache 510KB 510KB [ 2750.066456] file_lock_cache 47KB 47KB [ 2750.067026] file_lock_ctx 7KB 7KB [ 2750.067579] fsnotify_mark_connector 24KB 24KB [ 2750.068231] net_namespace 115KB 115KB [ 2750.068787] task_delay_info 146KB 146KB [ 2750.069359] taskstats 84KB 84KB [ 2750.069931] proc_dir_entry 361KB 375KB [ 2750.070484] pde_opener 31KB 31KB [ 2750.071050] seq_file 86KB 86KB [ 2750.071605] sigqueue 110KB 110KB [ 2750.072173] shmem_inode_cache 1253KB 1289KB [ 2750.072730] kernfs_iattrs_cache 250KB 250KB [ 2750.073330] kernfs_node_cache 5221KB 5268KB [ 2750.073894] mnt_cache 199KB 212KB [ 2750.074480] filp 1749KB 2085KB [ 2750.075074] names_cache 14156KB 15767KB [ 2750.075637] hashtab_node 274KB 274KB [ 2750.076206] ebitmap_node 1149KB 1149KB [ 2750.076761] avtab_node 4976KB 4976KB [ 2750.077332] avc_node 35KB 35KB [ 2750.077942] lsm_inode_cache 2661KB 2960KB [ 2750.078499] lsm_file_cache 188KB 196KB [ 2750.079068] key_jar 31KB 31KB [ 2750.079621] uts_namespace 15KB 15KB [ 2750.080196] nsproxy 7KB 7KB [ 2750.080752] vm_area_struct 1512KB 1512KB [ 2750.081326] mm_struct 409KB 567KB [ 2750.082028] fs_cache 79KB 100KB [ 2750.082586] files_cache 297KB 398KB [ 2750.083179] signal_cache 318KB 524KB [ 2750.083747] sighand_cache 275KB 360KB [ 2750.084331] task_struct 1555KB 1916KB [ 2750.084885] cred_jar 152KB 196KB [ 2750.085491] anon_vma_chain 406KB 492KB [ 2750.086068] anon_vma 246KB 262KB [ 2750.086630] pid 104KB 108KB [ 2750.087202] Acpi-Operand 88KB 122KB [ 2750.087755] Acpi-ParseExt 31KB 31KB [ 2750.088340] Acpi-Parse 158KB 173KB [ 2750.088900] Acpi-State 82KB 98KB [ 2750.089477] Acpi-Namespace 24KB 24KB [ 2750.090044] shared_policy_node 4KB 4KB [ 2750.090618] numa_policy 7KB 7KB [ 2750.091193] trace_event_file 163KB 163KB [ 2750.091750] ftrace_event_field 280KB 280KB [ 2750.092528] pool_workqueue 40KB 40KB [ 2750.093097] task_group 16KB 16KB [ 2750.093803] vmap_area 85KB 102KB [ 2750.094380] page->ptl 354KB 378KB [ 2750.095073] kmemleak_scan_area 41KB 55KB [ 2750.096202] kmemleak_object 135655KB 147083KB [ 2750.096891] kmalloc-8k 4688KB 4864KB [ 2750.097473] kmalloc-4k 8272KB 8800KB Connection to localhost closed by remote host. [ 2750.098187] kmalloc-2k 4464KB 4736KB [ 2750.098847] kmalloc-1k 2436KB 3680KB [ 2750.099450] kmalloc-512 3346KB 3760KB [ 2750.100036] kmalloc-256 1239KB 1296KB [ 2750.100629] kmalloc-192 371KB 520KB [ 2750.101309] kmalloc-128 561KB 596KB [ 2750.101900] kmalloc-96 391KB 596KB [ 2750.103160] kmalloc-64 1080KB 1240KB [ 2750.104490] kmalloc-32 870KB 952KB [ 2750.109381] kmalloc-16 376KB 376KB [ 2750.110793] kmalloc-8 302KB 330KB [ 2750.112056] kmem_cache_node 47KB 47KB [ 2750.113236] kmem_cache 75KB 75KB [ 2750.114425] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journald.service,task=systemd-journal,pid=14439,uid=0 [ 2750.118266] Out of memory (oom_kill_allocating_task): Killed process 14439 (systemd-journal) total-vm:23528kB, anon-rss:696kB, file-rss:0kB, shmem-rss:4kB, UID:0 pgtables:68kB oom_score_adj:-250 [ 2750.181244] systemd[1]: ssh.service: A process of this unit has been killed by the OOM killer. [ 2750.213144] systemd[1]: rsyslog.service: Main process exited, code=killed, status=9/KILL [ 2750.225785] systemd[1]: rsyslog.service: Failed with result 'signal'. [ 2750.283343] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 2750.291212] systemd[1]: systemd-journald.service: Failed with result 'signal'. [ 2750.313696] systemd[1]: Failed to start Journal Service. [ 2750.316672] systemd[1]: Dependency failed for Flush Journal to Persistent Storage. [ 2750.318479] systemd[1]: systemd-journal-flush.service: Job systemd-journal-flush.service/start failed with result 'dependency'. [ 2750.333268] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 2. [ 2750.335333] systemd[1]: Stopped Journal Service. [ 2750.410317] systemd[1]: Starting Journal Service... [ 2750.422619] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 2. [ 2750.429185] systemd[1]: Stopped System Logging Service. [ 2750.608811] systemd[1]: Starting System Logging Service... [ 2750.890375] systemd[1]: ssh.service: Failed with result 'oom-kill'. [ 2750.892840] systemd[1]: ssh.service: Unit process 13688 (syz-executor.0) remains running after unit stopped. [ 2750.935327] systemd[1]: ssh.service: Consumed 39min 31.340s CPU time. [ 2751.104446] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 1. [ 2751.119512] systemd[1]: Stopped OpenBSD Secure Shell server. [ 2751.121535] systemd[1]: ssh.service: Consumed 39min 31.428s CPU time. [ 2751.128529] systemd[1]: ssh.service: Found left-over process 13688 (syz-executor.0) in control group while starting unit. Ignoring. [ 2751.131046] systemd[1]: This usually indicates unclean termination of a previous run, or service implementation deficiencies. [ 2751.160790] systemd[1]: Starting OpenBSD Secure Shell server... [ 2751.173621] systemd[1]: Stopped target Bluetooth. [ 2751.310141] systemd[1]: Started System Logging Service. [ 2751.361098] systemd-journald[14442]: File /var/log/journal/7e681e5076844de4a5cfa8606a84b008/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 2751.578139] systemd[1]: Started OpenBSD Secure Shell server. [ 2752.050494] systemd[1]: Started Journal Service. VM DIAGNOSIS: 04:11:04 Registers: info registers vcpu 0 RAX=0000000000000003 RBX=0000000024e01000 RCX=ffffffff812f4b33 RDX=0000000000000004 RSI=0000000000000000 RDI=0000000000000001 RBP=0000000024e01000 RSP=ffff888034cd7000 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000020 R11=0000000000000001 R12=0000000000000000 R13=ffff88800fe01400 R14=dffffc0000000000 R15=0000000000000000 RIP=ffffffff81406164 RFL=00000097 [--S-APC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 000000c00009d590 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000739bbf CR3=000000000d856000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=2e646e616d6d6f43656b616d2e637069 XMM03=00000000000000000000000000000000 XMM04=f4d75f65f4d700000020000020000000 XMM05=f4d7000000010001ef53ffff00015f65 XMM06=00000000000100000000000000005f65 XMM07=840200000228000002000000000b0000 XMM08=30323030303030303030306230303030 XMM09=22343832303030303032303832303030 XMM10=2c5d7d3030347830202c32367830202c XMM11=30303030663778302826202c30783020 XMM12=0a295d5b3d594e413d29303039323130 XMM13=30303030303030303030303130303030 XMM14=30323030303030303030306230303030 XMM15=22343832303030303032303832303030 info registers vcpu 1 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff822c3a4c RDI=ffffffff879e4160 RBP=ffffffff879e4120 RSP=ffff88802bc57238 R8 =0000000000000001 R9 =0000000000000003 R10=000000000000000a R11=0000000000000001 R12=0000000000000020 R13=fffffbfff0f3c878 R14=fffffbfff0f3c82e R15=dffffc0000000000 RIP=ffffffff822c3aa0 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb0ef929900 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb0f041adb8 CR3=00000000469b0000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffffffffffff XMM01=30306234386136303638616663356134 XMM02=38303062343861363036386166633561 XMM03=2f6c616e72756f6a2f676f6c2f6e7572 XMM04=e9b396ece3e59d2000000000000b79f8 XMM05=a1fcdcf819d7e1e500000000000b04c8 XMM06=5837fe9dc1c91f3200000000000b0420 XMM07=00000000000000000000000000000000 XMM08=44495f474f4c5359530069253d595449 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000